Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- Hostname www.e-kujira.or.jp ISP Yahoo Japan Corporation
- Continent Asia Flag
- JP
- Country Japan Country Code JP
- Region Unknown Local time 18 Jan 2019 03:26 JST
- City Unknown Postal Code Unknown
- IP Address 210.152.243.182 Latitude 35.69
- ######################################################################################################################################
- > www.e-kujira.or.jp
- Server: 194.187.251.67
- Address: 194.187.251.67#53
- Non-authoritative answer:
- Name: www.e-kujira.or.jp
- Address: 210.152.243.182
- >
- #######################################################################################################################################
- HostIP:210.152.243.182
- HostName:www.e-kujira.or.jp
- Gathered Inet-whois information for 210.152.243.182
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 209.251.254.0 - 211.255.255.255
- netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
- descr: IPv4 address block not managed by the RIPE NCC
- remarks: ------------------------------------------------------
- remarks:
- remarks: For registration information,
- remarks: you can consult the following sources:
- remarks:
- remarks: IANA
- remarks: http://www.iana.org/assignments/ipv4-address-space
- remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
- remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
- remarks:
- remarks: AFRINIC (Africa)
- remarks: http://www.afrinic.net/ whois.afrinic.net
- remarks:
- remarks: APNIC (Asia Pacific)
- remarks: http://www.apnic.net/ whois.apnic.net
- remarks:
- remarks: ARIN (Northern America)
- remarks: http://www.arin.net/ whois.arin.net
- remarks:
- remarks: LACNIC (Latin America and the Carribean)
- remarks: http://www.lacnic.net/ whois.lacnic.net
- remarks:
- remarks: ------------------------------------------------------
- country: EU # Country is really world wide
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- status: ALLOCATED UNSPECIFIED
- mnt-by: RIPE-NCC-HM-MNT
- created: 2019-01-07T10:47:20Z
- last-modified: 2019-01-07T10:47:20Z
- source: RIPE
- role: Internet Assigned Numbers Authority
- address: see http://www.iana.org.
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- nic-hdl: IANA1-RIPE
- remarks: For more information on IANA services
- remarks: go to IANA web site at http://www.iana.org.
- mnt-by: RIPE-NCC-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2001-09-22T09:31:27Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.92.6 (BLAARKOP)
- Gathered Inic-whois information for e-kujira.or.jp
- ---------------------------------
- Gathered Netcraft information for www.e-kujira.or.jp
- ---------------------------------
- Retrieving Netcraft.com information for www.e-kujira.or.jp
- Netcraft.com Information gathered
- Gathered Subdomain information for e-kujira.or.jp
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- HostName:www.e-kujira.or.jp
- HostIP:210.152.243.182
- Searching Altavista.com:80...
- Found 1 possible subdomain(s) for host e-kujira.or.jp, Searched 0 pages containing 0 results
- Gathered E-Mail information for e-kujira.or.jp
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host e-kujira.or.jp, Searched 0 pages containing 0 results
- Gathered TCP Port information for 210.152.243.182
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 21/tcp open
- 22/tcp open
- 80/tcp open
- 110/tcp open
- Portscan Finished: Scanned 150 ports, 2 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: https://www.e-kujira.or.jp
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: ������١�����ʤɷ�����Ȥä��������Υ쥷�Ԥ������Τޤǡ�������Τ��Ȥʤ餯���鲣���ޤǡ�
- [+] IP address: 210.152.243.182
- [+] Web Server: Apache
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Could NOT Find robots.txt!
- W H O I S L O O K U P
- =======================================================================================================================================
- [ JPRS database provides information on network administration. Its use is ]
- [ restricted to network administration purposes. For further information, ]
- [ use 'whois -h whois.jprs.jp help'. To suppress Japanese output, add'/e' ]
- [ at the end of command, e.g. 'whois -h whois.jprs.jp xxx/e'. ]
- Domain Information:
- a. [Domain Name] E-KUJIRA.OR.JP
- g. [Organization] THE INSTITUTE OF CETACEAN RESEARCH
- l. [Organization Type] Foundation
- m. [Administrative Contact] AS1865JP
- n. [Technical Contact] AS1866JP
- p. [Name Server] ns1.netassist.ne.jp
- p. [Name Server] ns2.netassist.ne.jp
- s. [Signing Key]
- [State] Connected (2019/01/31)
- [Registered Date] 2001/01/17
- [Connected Date] 2001/01/25
- [Last Update] 2018/02/01 01:04:24 (JST)
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 210.152.243.182
- [i] Country: Japan
- [i] State:
- [i] City:
- [i] Latitude: 35.69
- [i] Longitude: 139.69
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Date: Thu, 17 Jan 2019 18:34:30 GMT
- [i] Server: Apache
- [i] X-Powered-By: PHP/5.1.6
- [i] Content-Language: ja
- [i] Connection: close
- [i] Content-Type: text/html; charset=EUC-JP
- D N S L O O K U P
- =======================================================================================================================================
- e-kujira.or.jp. 599 IN SOA nsm.netassist.ne.jp. root.e-kujira.or.jp. 2016041403 7200 3600 2419200 3600
- e-kujira.or.jp. 599 IN NS ns1.netassist.ne.jp.
- e-kujira.or.jp. 599 IN NS ns2.netassist.ne.jp.
- e-kujira.or.jp. 599 IN A 210.152.243.182
- e-kujira.or.jp. 599 IN MX 10 mail.e-kujira.or.jp.
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 210.152.243.182
- Network = 210.152.243.182 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 210.152.243.182 - 210.152.243.182 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2019-01-17 18:34 UTC
- Nmap scan report for e-kujira.or.jp (210.152.243.182)
- Host is up (0.17s latency).
- rDNS record for 210.152.243.182: 210-152-243-182.jp-west.compute.idcfcloud.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 17.47 seconds
- S U B - D O M A I N F I N D E R
- =======================================================================================================================================
- [i] Total Subdomains Found : 1
- [+] Subdomain: www.e-kujira.or.jp
- [-] IP: 210.152.243.182
- #######################################################################################################################################
- [?] Enter the target: https://www.e-kujira.or.jp/
- [!] IP Address : 210.152.243.182
- [!] www.e-kujira.or.jp doesn't seem to use a CMS
- [+] Honeypot Probabilty: 0%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for www.e-kujira.or.jp
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/www.e-kujira.or.jp
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 2.36 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> e-kujira.or.jp
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28489
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;e-kujira.or.jp. IN A
- ;; ANSWER SECTION:
- e-kujira.or.jp. 600 IN A 210.152.243.182
- ;; Query time: 439 msec
- ;; SERVER: 194.187.251.67#53(194.187.251.67)
- ;; WHEN: jeu jan 17 13:43:03 EST 2019
- ;; MSG SIZE rcvd: 59
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> +trace e-kujira.or.jp
- ;; global options: +cmd
- . 82423 IN NS f.root-servers.net.
- . 82423 IN NS l.root-servers.net.
- . 82423 IN NS c.root-servers.net.
- . 82423 IN NS h.root-servers.net.
- . 82423 IN NS g.root-servers.net.
- . 82423 IN NS j.root-servers.net.
- . 82423 IN NS b.root-servers.net.
- . 82423 IN NS a.root-servers.net.
- . 82423 IN NS e.root-servers.net.
- . 82423 IN NS m.root-servers.net.
- . 82423 IN NS i.root-servers.net.
- . 82423 IN NS d.root-servers.net.
- . 82423 IN NS k.root-servers.net.
- . 82423 IN RRSIG NS 8 0 518400 20190130050000 20190117040000 16749 . Azy1eOJ+B5Uu2yx6ELRc2iI1ffseNRNZjqw9kcgmw0Kix5eTfXRWxzHz vmc5qaSvWV2/0hW2DPSQDwC76wF88iS357OEMzobwOImyiluWTjxc47P uCmZ41Ye7Nk8WVSbTij20z8cRSKoFXlvUVrCqnruyFdnaedUHPTMjz7H C5vi4CkkgmSeBu+LhSExAVQfgnGwGfrPn6rr9XVQeTuX87DoLTPqYuol d8zEe8YB+lKHe9wSRIIL6S7emvZqfZAdvGYz82BGIw1nn6+lh2mBF2iQ dGr/4f82hkdcSUQRXRFjG9X/EdxoH9NVVoqxv7JgnrvemLb1SLY8fwOR xG7TYw==
- ;; Received 525 bytes from 194.187.251.67#53(194.187.251.67) in 201 ms
- jp. 172800 IN NS a.dns.jp.
- jp. 172800 IN NS d.dns.jp.
- jp. 172800 IN NS e.dns.jp.
- jp. 172800 IN NS f.dns.jp.
- jp. 172800 IN NS h.dns.jp.
- jp. 172800 IN NS g.dns.jp.
- jp. 172800 IN NS c.dns.jp.
- jp. 172800 IN NS b.dns.jp.
- jp. 86400 IN DS 54004 8 1 0EC348CC7E6D3213CC89E5867088043FC7D5C111
- jp. 86400 IN DS 54004 8 2 5F4B24F667BC70880720D10DF317DC8FF80C63E586D504E6BBFE53F0 B9ECC040
- jp. 86400 IN RRSIG DS 8 1 86400 20190130170000 20190117160000 16749 . V4kjYg+jwjJ1f0swTimvFrlE4R1ZYmV7bFO6IcunYBZloxpF+hn4NpJG SuNTzxOxdsh61+QC37QFDtqXHgyp1hMsTFdpmW2cAYdbwLpq3Wp8fVK9 2GWJ/NHwF7hGh6XY6HZ7BqQcg/mUKQbVmhQhTUjqGHkyZnZj7x1GqOaK 37Xg2xSmsJ6PhiWlzrK4eceNTBgpNi7pA0mn34C2gPm5ebDsygf5ct8y QXLfKprOclely3+1HSwOx9Khbqs1q2RoInVZqeHj6pWJ7ZVgZbcoKlgf Qlw3QHncspufhnvHk3eKpM7QLsUlS5ky7JvahYoiE0MGarh4TNTU186s rOLggg==
- ;; Received 870 bytes from 198.41.0.4#53(a.root-servers.net) in 187 ms
- e-kujira.or.jp. 86400 IN NS ns2.netassist.ne.jp.
- e-kujira.or.jp. 86400 IN NS ns1.netassist.ne.jp.
- S235ENMMJM0CQN5D8OKOOVQ3FLER4DTU.jp. 900 IN NSEC3 1 1 5 B1D5F6BC8A S23G0L5Q863AQEOJSD3OMHDE51JK1G3U TXT RRSIG
- S235ENMMJM0CQN5D8OKOOVQ3FLER4DTU.jp. 900 IN RRSIG NSEC3 8 2 900 20190211174501 20190112174501 64263 jp. aqvo/9ujo8BGck8KMd/hAs1tiusBvHvUaT1pXLYQPzu4UinSBKOfWpM0 L+PcLZudJD6N586QLmYF33z/VpeCDVgfjmKwq1yFLlDVW2RiuputQntA 3JfK0cVP2dguMYH9oIV0G782BUdSmBaSayTQdYwr7OxuHx+8CMdnNO2X U7k=
- VPR71VL735OEBA4LNA99MK6H5872U0AJ.jp. 900 IN NSEC3 1 1 5 B1D5F6BC8A VQ1RBKCC9NLPFMC7FMUQATIQQ6JPHHBN TXT RRSIG
- VPR71VL735OEBA4LNA99MK6H5872U0AJ.jp. 900 IN RRSIG NSEC3 8 2 900 20190211174501 20190112174501 64263 jp. df8ep/3Ro4QHJOcq0q4r+qrov0aFU5N1c2hGeuvdHQ9LesXPXwAdeCYA FfHaL2boH+52+ixkYpWv6IhYtg2H6ogt86lNrpA3K4P/WXs/xvWoKeH3 09saSNQwFRQ/GC5kA0uf9wSyShh/gHFs7DGYFpMDHMckd2Fr4LHosujA stI=
- ;; Received 644 bytes from 2001:dc4::1#53(a.dns.jp) in 163 ms
- e-kujira.or.jp. 600 IN A 210.152.243.182
- e-kujira.or.jp. 600 IN NS ns1.netassist.ne.jp.
- e-kujira.or.jp. 600 IN NS ns2.netassist.ne.jp.
- ;; Received 140 bytes from 52.69.16.243#53(ns2.netassist.ne.jp) in 427 ms
- #######################################################################################################################################
- Saut Nom d'hôte Adresse IP Temps 1
- 1 10.244.200.1 10.244.200.1 143.334
- 1 10.244.200.1 10.244.200.1 153.962
- 2 vlan50.as083.buc.ro.m247.com 185.163.111.1 141.832
- 3 172.30.244.193 172.30.244.193 144.349
- 4 172.30.245.49 172.30.245.49 144.919
- 5 te5-13-0-bb1.buc1.ro.m247.ro 83.217.231.89 144.349
- 6 ae-18.r24.amstnl02.nl.bb.gin.ntt.net 129.250.3.62 184.698
- 7 ae-18.r24.amstnl02.nl.bb.gin.ntt.net 129.250.3.62 177.477
- 8 ae-5.r23.asbnva02.us.bb.gin.ntt.net 129.250.6.162 268.711
- 9 ae-5.r23.asbnva02.us.bb.gin.ntt.net 129.250.6.162 270.133
- 10 ae-15.r24.osakjp02.jp.bb.gin.ntt.net 129.250.2.131 451.231
- 11 ae-15.r24.osakjp02.jp.bb.gin.ntt.net 129.250.2.131 445.896
- 12 ae-1.r03.osakjp02.jp.bb.gin.ntt.net 129.250.7.31 439.283
- 13 xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net 61.200.80.218 441.280
- 14 xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net 61.200.80.218 450.351
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: e-kujira.or.jp
- [-] DNSSEC is not configured for e-kujira.or.jp
- [*] SOA nsm.netassist.ne.jp 210.168.17.232
- [*] NS ns2.netassist.ne.jp 52.69.16.243
- [*] Bind Version for 52.69.16.243 no answer
- [*] NS ns1.netassist.ne.jp 210.168.17.234
- [*] Bind Version for 210.168.17.234 no answer
- [*] MX mail.e-kujira.or.jp 210.152.243.182
- [*] A e-kujira.or.jp 210.152.243.182
- [*] Enumerating SRV Records
- [-] No SRV Records Found for e-kujira.or.jp
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain e-kujira.or.jp
- [*] Using system resolvers ['194.187.251.67', '185.93.180.131', '83.143.245.42', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2', '205.151.67.6', '205.151.67.34', '205.151.67.2']
- [+] Getting nameservers
- 52.69.16.243 - ns2.netassist.ne.jp
- 210.168.17.234 - ns1.netassist.ne.jp
- [-] Zone transfer failed
- [+] MX records found, added to target list
- 10 mail.e-kujira.or.jp.
- [*] Scanning e-kujira.or.jp for A records
- 210.152.243.182 - e-kujira.or.jp
- 210.152.243.182 - ftp.e-kujira.or.jp
- 210.152.243.182 - mail.e-kujira.or.jp
- 210.168.72.54 - old.e-kujira.or.jp
- 210.152.243.182 - www.e-kujira.or.jp
- #######################################################################################################################################
- =======================================================================================================================================
- | E-mails:
- | [+] E-mail Found: mike@hyperreal.org
- | [+] E-mail Found: airasyoku@yahoo.co.jp
- | [+] E-mail Found: kevinh@kevcom.com
- | [+] E-mail Found: syokubunka@kujiragumi.com
- | [+] E-mail Found: kujira@e-kujira.or.jp
- | [+] E-mail Found: info@94ra.com
- | [+] E-mail Found: info@nipo-brasil.org
- | [+] E-mail Found: license@php.net
- | [+] E-mail Found: shimonoseki-kujira@hotmail.co.jp
- =======================================================================================================================================
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 210.152.243.182
- + Target Hostname: www.e-kujira.or.jp
- + Target Port: 443
- ---------------------------------------------------------------------------------------------------------------------------------------
- + SSL Info: Subject: /CN=www.e-kujira.or.jp
- Ciphers: ECDHE-RSA-AES256-GCM-SHA384
- Issuer: /C=JP/O=Japan Registry Services Co., Ltd./CN=JPRS Domain Validation Authority - G2
- + Start Time: 2019-01-17 13:33:50 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: Apache
- + Retrieved x-powered-by header: PHP/5.1.6
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Server leaks inodes via ETags, header found with file /favicon.ico, inode: 4456550, size: 0, mtime: Tue Nov 20 00:46:12 2012
- + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
- + 439 requests: 0 error(s) and 7 item(s) reported on remote host
- + End Time: 2019-01-17 13:48:15 (GMT-5) (865 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- www.e-kujira.or.jp -----
- Host's addresses:
- __________________
- www.e-kujira.or.jp. 239 IN A 210.152.243.182
- Name Servers:
- ______________
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:35 EST
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.44s latency).
- Not shown: 465 filtered ports, 5 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 80/tcp open http
- 110/tcp open pop3
- 443/tcp open https
- 587/tcp open submission
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:37 EST
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.14s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:37 EST
- NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
- NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
- NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.44s latency).
- PORT STATE SERVICE VERSION
- 21/tcp open ftp vsftpd 2.2.2
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 1915 guesses in 183 seconds, average tps: 11.3
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: storage-misc|general purpose|WAP|specialized
- Running (JUST GUESSING): Synology DiskStation Manager 5.X (91%), Linux 2.6.X|3.X (90%), Ruckus embedded (89%), Crestron 2-Series (87%), Asus embedded (86%), HP embedded (85%)
- OS CPE: cpe:/a:synology:diskstation_manager:5.2 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/h:ruckus:zoneflex_r710 cpe:/o:crestron:2_series cpe:/h:asus:rt-n56u cpe:/o:linux:linux_kernel:3.4 cpe:/h:hp:p2000_g3
- Aggressive OS guesses: Synology DiskStation Manager 5.2-5644 (91%), Linux 2.6.32 - 3.10 (90%), Linux 2.6.32 - 3.13 (90%), Linux 2.6.32 - 3.9 (90%), Linux 2.6.32 (89%), Linux 2.6.32 - 3.1 (89%), Linux 3.10 (89%), Linux 3.2 (89%), Linux 3.4 - 3.10 (89%), Linux 3.5 (89%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- Service Info: OS: Unix
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 142.92 ms 10.244.200.1
- 2 143.35 ms 185.163.111.1
- 3 142.02 ms 172.30.244.193
- 4 141.98 ms 172.30.245.49
- 5 142.37 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 452.27 ms ae-1.r01.buchro01.ro.bb.gin.ntt.net (129.250.3.138)
- 7 180.21 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 8 273.08 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 338.28 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 338.98 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 11 464.21 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 462.56 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 13 447.34 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 14 ... 16
- 17 468.90 ms 210-152-243-182.jp-west.compute.idcfcloud.com (210.152.243.182)
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:41 EST
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.40s latency).
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 143.29 ms 10.244.200.1
- 2 143.76 ms 185.163.111.1
- 3 143.73 ms 172.30.244.193
- 4 143.76 ms 172.30.245.49
- 5 143.99 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 180.03 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 180.00 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 274.48 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 338.24 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 450.61 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 447.54 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 439.64 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 444.07 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 437.57 ms 210.152.243.182
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:42 EST
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 144.94 ms 10.244.200.1
- 2 145.36 ms 185.163.111.1
- 3 145.00 ms 172.30.244.193
- 4 145.03 ms 172.30.245.49
- 5 145.35 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 181.71 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 180.97 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 274.32 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 339.07 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 451.75 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 447.43 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 441.15 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 444.14 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 443.64 ms 210.152.243.182
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:45 EST
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 137.83 ms 10.244.200.1
- 2 137.96 ms 185.163.111.1
- 3 137.90 ms 172.30.244.193
- 4 137.93 ms 172.30.245.49
- 5 137.96 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 174.20 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 173.01 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 267.10 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 331.64 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 445.99 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 447.00 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 440.72 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 443.49 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 432.35 ms 210.152.243.182
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:47 EST
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 143.69 ms 10.244.200.1
- 2 144.13 ms 185.163.111.1
- 3 143.76 ms 172.30.244.193
- 4 143.75 ms 172.30.245.49
- 5 144.72 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 180.55 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 179.18 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 274.17 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 340.76 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 451.05 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 444.08 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 438.43 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 440.20 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 431.63 ms 210.152.243.182
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://www.e-kujira.or.jp
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 17
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning https://www.e-kujira.or.jp...
- ________________________________________________ SITE INFO ________________________________________________
- IP Title
- 210.152.243.182 ������١�����ʤɷ�����Ȥä��������Υ쥷�Ԥ������Τޤǡ�������Τ��Ȥʤ餯���鲣���ޤǡ�
- _________________________________________________ VERSION _________________________________________________
- Name Versions Type
- Apache 2.2.11 | 2.2.12 | 2.2.13 | 2.2.14 | 2.2.15 | 2.2.16 | 2.2.17 Platform
- 2.2.18 | 2.2.19 | 2.2.20 | 2.2.21 | 2.2.22 | 2.2.23 | 2.2.24
- 2.2.25 | 2.2.26 | 2.3.0 | 2.3.1 | 2.3.10 | 2.3.11 | 2.3.12
- 2.3.13 | 2.3.14 | 2.3.15 | 2.3.16 | 2.3.2 | 2.3.3 | 2.3.4
- 2.3.5 | 2.3.6 | 2.3.7 | 2.3.8 | 2.3.9 | 2.4.0 | 2.4.1
- 2.4.2 | 2.4.3
- PHP 5.1.6 Platform
- CentOS 5.11 OS
- Fedora 6 OS
- OpenBSD 4.1 OS
- Red Hat Enterprise Linux RHEL-5.11 OS
- Scientific Linux 5.11 OS
- _______________________________________________ INTERESTING _______________________________________________
- URL Note Type
- /info.php PHP info file Interesting
- ___________________________________________________________________________________________________________
- Time: 205.1 sec Urls: 858 Fingerprints: 40401
- ########################################################################################################################################
- HTTP/1.1 302 Found
- Date: Thu, 17 Jan 2019 18:54:29 GMT
- Location: https://www.e-kujira.or.jp/
- Content-Type: text/html; charset=iso-8859-1
- Connection: keep-alive
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [17-01-2019 13:54:57]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-www.e-kujira.or.jp ]
- [ INFO ][ DORK ]::[ site:www.e-kujira.or.jp ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.in ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.vc ID: 006688160405527839966:yhpefuwybre ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 0 / 100 ]-[13:55:19] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 1 / 100 ]-[13:55:22] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/picturebook/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 2 / 100 ]-[13:55:25] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/discovery/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 3 / 100 ]-[13:55:27] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/before/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 4 / 100 ]-[13:55:31] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/dictionary/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 5 / 100 ]-[13:55:34] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/whaletheory/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 6 / 100 ]-[13:55:37] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/kujirapedia/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 7 / 100 ]-[13:55:41] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/news/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 8 / 100 ]-[13:55:45] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/cooking/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 9 / 100 ]-[13:55:48] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/contact/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 10 / 100 ]-[13:55:51] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/puctureform/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 11 / 100 ]-[13:55:54] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/link/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 12 / 100 ]-[13:55:57] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 13 / 100 ]-[13:56:00] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 14 / 100 ]-[13:56:03] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/drawing/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 15 / 100 ]-[13:56:09] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/whaletheory/morishita/1/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 266456 bytes received
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 16 / 100 ]-[13:56:12] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=1 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 17 / 100 ]-[13:56:16] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=4 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 18 / 100 ]-[13:56:19] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=39 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 19 / 100 ]-[13:56:22] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=27 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 20 / 100 ]-[13:56:25] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=42 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 21 / 100 ]-[13:56:28] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=30 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 22 / 100 ]-[13:56:31] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/whaletheory/ohsumi/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 23 / 100 ]-[13:56:35] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=35 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 24 / 100 ]-[13:56:38] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=23 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 25 / 100 ]-[13:56:41] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=35 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 26 / 100 ]-[13:56:44] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=17 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 27 / 100 ]-[13:56:48] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=12 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 28 / 100 ]-[13:56:51] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=42 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 29 / 100 ]-[13:56:55] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=14 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 30 / 100 ]-[13:56:59] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/cooking/?ca=10 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 31 / 100 ]-[13:57:02] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/cooking/?ca=2 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 32 / 100 ]-[13:57:05] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=22 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 33 / 100 ]-[13:57:08] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=40 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 34 / 100 ]-[13:57:12] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=8 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 35 / 100 ]-[13:57:16] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=27 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 36 / 100 ]-[13:57:19] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/cooking/?ca=1 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 37 / 100 ]-[13:57:22] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=34 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 38 / 100 ]-[13:57:26] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=40 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 39 / 100 ]-[13:57:29] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=11 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 40 / 100 ]-[13:57:32] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=16 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 41 / 100 ]-[13:57:35] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=28 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 42 / 100 ]-[13:57:38] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/whaletheory/morishita/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 43 / 100 ]-[13:57:41] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=28 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 44 / 100 ]-[13:57:45] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=7 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 45 / 100 ]-[13:57:48] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/cooking/?ca=4 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 46 / 100 ]-[13:57:51] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=44 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 47 / 100 ]-[13:57:54] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=41 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 48 / 100 ]-[13:57:56] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/whaletheory/miura/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 49 / 100 ]-[13:58:00] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=14 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 50 / 100 ]-[13:58:02] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=2 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 51 / 100 ]-[13:58:05] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/cooking/?ca=3 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 52 / 100 ]-[13:58:08] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=1 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 53 / 100 ]-[13:58:11] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=34 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 54 / 100 ]-[13:58:14] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=12 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 55 / 100 ]-[13:58:17] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=30 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 56 / 100 ]-[13:58:20] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=19 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 57 / 100 ]-[13:58:23] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=15 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 58 / 100 ]-[13:58:25] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=21 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 59 / 100 ]-[13:58:28] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=41 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 60 / 100 ]-[13:58:31] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=43 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 61 / 100 ]-[13:58:33] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=13 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 62 / 100 ]-[13:58:36] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=26 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 63 / 100 ]-[13:58:39] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=4 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 64 / 100 ]-[13:58:42] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=26 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 65 / 100 ]-[13:58:44] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=38 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 66 / 100 ]-[13:58:47] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=6 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 67 / 100 ]-[13:58:50] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=10 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 68 / 100 ]-[13:58:53] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=13 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 69 / 100 ]-[13:58:55] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=18 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 70 / 100 ]-[13:58:58] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=3 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 71 / 100 ]-[13:59:01] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=6 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 72 / 100 ]-[13:59:04] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=24 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 73 / 100 ]-[13:59:06] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=43 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 74 / 100 ]-[13:59:09] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=44 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 75 / 100 ]-[13:59:12] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=15 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 76 / 100 ]-[13:59:14] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=46 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 77 / 100 ]-[13:59:17] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=31 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 78 / 100 ]-[13:59:20] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=5 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 79 / 100 ]-[13:59:23] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=24 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 80 / 100 ]-[13:59:25] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=46 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 81 / 100 ]-[13:59:28] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=25 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 82 / 100 ]-[13:59:31] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=9 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 83 / 100 ]-[13:59:33] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=29 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 84 / 100 ]-[13:59:36] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=39 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 85 / 100 ]-[13:59:39] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=9 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 86 / 100 ]-[13:59:42] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=23 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 87 / 100 ]-[13:59:44] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=17 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 88 / 100 ]-[13:59:47] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=3 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 89 / 100 ]-[13:59:50] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=33 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 90 / 100 ]-[13:59:52] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=21 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 91 / 100 ]-[13:59:55] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=37 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 92 / 100 ]-[13:59:58] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=2 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 93 / 100 ]-[14:00:01] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=31 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 94 / 100 ]-[14:00:03] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=32 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 95 / 100 ]-[14:00:06] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=33 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 96 / 100 ]-[14:00:09] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=45 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 97 / 100 ]-[14:00:12] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=20 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 98 / 100 ]-[14:00:14] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/shop/?ca=32 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 99 / 100 ]-[14:00:17] [ - ]
- |_[ + ] Target:: [ https://www.e-kujira.or.jp/buy/?ca=20 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache X-Powered-By: PHP/5.1.6, IP:210.152.243.182:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [17-01-2019 14:00:17]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-www.e-kujira.or.jp ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 14:00 EST
- NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
- NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
- NSE: [pop3-brute] passwords: Time limit 3m00s exceeded.
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.15s latency).
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 qmail pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 1937 guesses in 180 seconds, average tps: 10.4
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|WAP|storage-misc|specialized
- Running (JUST GUESSING): Linux 3.X|2.6.X (91%), Ruckus embedded (89%), Synology DiskStation Manager 5.X (89%), Crestron 2-Series (87%), Asus embedded (86%), HP embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:2.6 cpe:/h:ruckus:zoneflex_r710 cpe:/a:synology:diskstation_manager:5.2 cpe:/o:crestron:2_series cpe:/h:asus:rt-n56u cpe:/o:linux:linux_kernel:3.4 cpe:/h:hp:p2000_g3
- Aggressive OS guesses: Linux 3.10 (91%), Linux 3.4 - 3.10 (91%), Linux 2.6.32 - 3.10 (90%), Linux 2.6.32 - 3.13 (90%), Linux 2.6.32 - 3.9 (90%), Linux 2.6.32 (89%), Linux 3.11 (89%), Linux 3.2 (89%), Linux 3.5 (89%), Linux 3.8 (89%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 1 hop
- Service Info: Host: geirui-20161130
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 142.24 ms 210.152.243.182
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 14:04 EST
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 141.50 ms 10.244.200.1
- 2 141.84 ms 185.163.111.1
- 3 141.83 ms 172.30.244.193
- 4 141.81 ms 172.30.245.49
- 5 141.84 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 179.86 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 178.13 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 271.20 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 335.70 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 448.75 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 445.96 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 439.08 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 442.45 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 432.10 ms 210.152.243.182
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://www.e-kujira.or.jp
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 14
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning https://www.e-kujira.or.jp...
- ________________________________________________ SITE INFO ________________________________________________
- IP Title
- 210.152.243.182 ������١�����ʤɷ�����Ȥä��������Υ쥷�Ԥ������Τޤǡ�������Τ��Ȥʤ餯���鲣���ޤǡ�
- _________________________________________________ VERSION _________________________________________________
- Name Versions Type
- Apache 2.2.11 | 2.2.12 | 2.2.13 | 2.2.14 | 2.2.15 | 2.2.16 | 2.2.17 Platform
- 2.2.18 | 2.2.19 | 2.2.20 | 2.2.21 | 2.2.22 | 2.2.23 | 2.2.24
- 2.2.25 | 2.2.26 | 2.3.0 | 2.3.1 | 2.3.10 | 2.3.11 | 2.3.12
- 2.3.13 | 2.3.14 | 2.3.15 | 2.3.16 | 2.3.2 | 2.3.3 | 2.3.4
- 2.3.5 | 2.3.6 | 2.3.7 | 2.3.8 | 2.3.9 | 2.4.0 | 2.4.1
- 2.4.2 | 2.4.3
- PHP 5.1.6 Platform
- CentOS 5.11 OS
- Fedora 6 OS
- OpenBSD 4.1 OS
- Red Hat Enterprise Linux RHEL-5.11 OS
- Scientific Linux 5.11 OS
- _______________________________________________ INTERESTING _______________________________________________
- URL Note Type
- /info.php PHP info file Interesting
- ___________________________________________________________________________________________________________
- Time: 2.1 sec Urls: 858 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Thu, 17 Jan 2019 19:08:05 GMT
- Server: Apache
- X-Powered-By: PHP/5.1.6
- Content-Language: ja
- Connection: close
- Content-Type: text/html; charset=EUC-JP
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- PluginSessionRenegotiation
- PluginCertInfo
- PluginOpenSSLCipherSuites
- PluginSessionResumption
- PluginCompression
- PluginHSTS
- PluginHeartbleed
- PluginChromeSha1Deprecation
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- www.e-kujira.or.jp:443 => 210.152.243.182:443
- SCAN RESULTS FOR WWW.E-KUJIRA.OR.JP:443 - 210.152.243.182:443
- -------------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: fad1e751921a293a507fa7437cdd12faa572d5af
- Common Name: www.e-kujira.or.jp
- Issuer: JPRS Domain Validation Authority - G2
- Serial Number: 5FB6439EFD0FC68A
- Not Before: Aug 20 02:55:26 2018 GMT
- Not After: Aug 31 14:59:59 2019 GMT
- Signature Algorithm: sha256WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- X509v3 Subject Alternative Name: {'DNS': ['www.e-kujira.or.jp', 'e-kujira.or.jp']}
- * Certificate - Trust:
- Hostname Validation: OK - Subject Alternative Name matches
- Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Java 6 CA Store (Update 65): OK - Certificate is trusted
- Microsoft CA Store (09/2015): OK - Certificate is trusted
- Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
- Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
- Certificate Chain Received: ['www.e-kujira.or.jp', 'JPRS Domain Validation Authority - G2']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * OpenSSL Heartbleed:
- OK - Not vulnerable to Heartbleed
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: OK - Supported
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * TLSV1_2 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES256-GCM-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- ECDHE-RSA-AES256-GCM-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA256 DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-GCM-SHA384 DH-2048 bits 256 bits HTTP 200 OK
- AES256-SHA256 - 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- AES256-GCM-SHA384 - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- ECDHE-RSA-AES128-GCM-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA256 DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-GCM-SHA256 DH-2048 bits 128 bits HTTP 200 OK
- AES128-SHA256 - 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- AES128-GCM-SHA256 - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- EDH-RSA-DES-CBC3-SHA DH-2048 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- * TLSV1_1 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- EDH-RSA-DES-CBC3-SHA DH-2048 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- * TLSV1 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- EDH-RSA-DES-CBC3-SHA DH-2048 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- SCAN COMPLETED IN 35.59 S
- -------------------------
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 210.152.243.182
- Testing SSL server www.e-kujira.or.jp on port 443 using SNI name www.e-kujira.or.jp
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: www.e-kujira.or.jp
- Altnames: DNS:www.e-kujira.or.jp, DNS:e-kujira.or.jp
- Issuer: JPRS Domain Validation Authority - G2
- Not valid before: Aug 20 02:55:26 2018 GMT
- Not valid after: Aug 31 14:59:59 2019 GMT
- #######################################################################################################################################
- I, [2019-01-17T14:10:07.847547 #26878] INFO -- : Initiating port scan
- I, [2019-01-17T14:11:33.447302 #26878] INFO -- : Using nmap scan output file logs/nmap_output_2019-01-17_14-10-07.xml
- I, [2019-01-17T14:11:33.448311 #26878] INFO -- : Discovered open port: 210.152.243.182:80
- I, [2019-01-17T14:11:35.294197 #26878] INFO -- : Discovered open port: 210.152.243.182:443
- I, [2019-01-17T14:11:38.849612 #26878] INFO -- : <<<Enumerating vulnerable applications>>>
- [+] Yasuo found phpMyAdmin at https://210.152.243.182:443/phpmyadmin/. Requires HTTP basic auth
- I, [2019-01-17T14:13:33.852206 #26878] INFO -- : Initiating login bruteforce, hold on tight...
- [+] Trying app-specific default creds first -> admin:admin
- Could not find default credentials, sucks
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- ---------------------------------------------------------------------------------------------------------------------------------------
- +------------+-----------------------------------------+--------------------------------------------------+-----------+-----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +------------+-----------------------------------------+--------------------------------------------------+-----------+-----------+
- | phpMyAdmin | https://210.152.243.182:443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
- +------------+-----------------------------------------+--------------------------------------------------+-----------+-----------+
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 14:17 EST
- NSE: Loaded 149 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 14:17
- Completed NSE at 14:17, 0.00s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 14:17
- Completed NSE at 14:17, 0.00s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 14:17
- Completed NSE at 14:17, 0.00s elapsed
- Initiating Ping Scan at 14:17
- Scanning www.e-kujira.or.jp (210.152.243.182) [4 ports]
- Completed Ping Scan at 14:17, 0.20s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 14:17
- Completed Parallel DNS resolution of 1 host. at 14:17, 16.50s elapsed
- Initiating Connect Scan at 14:17
- Scanning www.e-kujira.or.jp (210.152.243.182) [1000 ports]
- Discovered open port 21/tcp on 210.152.243.182
- Discovered open port 443/tcp on 210.152.243.182
- Discovered open port 110/tcp on 210.152.243.182
- Discovered open port 80/tcp on 210.152.243.182
- Discovered open port 587/tcp on 210.152.243.182
- Completed Connect Scan at 14:18, 21.02s elapsed (1000 total ports)
- Initiating Service scan at 14:18
- Scanning 5 services on www.e-kujira.or.jp (210.152.243.182)
- Completed Service scan at 14:18, 35.97s elapsed (5 services on 1 host)
- Initiating OS detection (try #1) against www.e-kujira.or.jp (210.152.243.182)
- Retrying OS detection (try #2) against www.e-kujira.or.jp (210.152.243.182)
- Initiating Traceroute at 14:18
- Completed Traceroute at 14:18, 3.21s elapsed
- Initiating Parallel DNS resolution of 14 hosts. at 14:18
- Completed Parallel DNS resolution of 14 hosts. at 14:19, 16.50s elapsed
- NSE: Script scanning 210.152.243.182.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 14:19
- Completed NSE at 14:19, 20.04s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 14:19
- Completed NSE at 14:19, 6.17s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 14:19
- Completed NSE at 14:19, 0.00s elapsed
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up, received reset ttl 64 (0.44s latency).
- Scanned at 2019-01-17 14:17:25 EST for 127s
- Not shown: 967 filtered ports
- Reason: 967 no-responses
- PORT STATE SERVICE REASON VERSION
- 21/tcp open ftp syn-ack vsftpd 2.2.2
- 22/tcp closed ssh conn-refused
- 25/tcp closed smtp conn-refused
- 80/tcp open http-proxy syn-ack Squid http proxy
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-open-proxy: Proxy might be redirecting requests
- |_http-title: Did not follow redirect to https://www.e-kujira.or.jp/
- 110/tcp open pop3 syn-ack qmail pop3d
- 139/tcp closed netbios-ssn conn-refused
- 443/tcp open ssl/ssl syn-ack Apache httpd (SSL-only mode)
- | ssl-cert: Subject: commonName=www.e-kujira.or.jp
- | Subject Alternative Name: DNS:www.e-kujira.or.jp, DNS:e-kujira.or.jp
- | Issuer: commonName=JPRS Domain Validation Authority - G2/organizationName=Japan Registry Services Co., Ltd./countryName=JP
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-20T02:55:26
- | Not valid after: 2019-08-31T14:59:59
- | MD5: b154 8c40 9a17 05c0 21c9 1fa2 5d50 4b79
- | SHA-1: fad1 e751 921a 293a 507f a743 7cdd 12fa a572 d5af
- | -----BEGIN CERTIFICATE-----
- | MIIGDDCCBPSgAwIBAgIIX7ZDnv0PxoowDQYJKoZIhvcNAQELBQAwaTELMAkGA1UE
- | BhMCSlAxKjAoBgNVBAoTIUphcGFuIFJlZ2lzdHJ5IFNlcnZpY2VzIENvLiwgTHRk
- | LjEuMCwGA1UEAxMlSlBSUyBEb21haW4gVmFsaWRhdGlvbiBBdXRob3JpdHkgLSBH
- | MjAeFw0xODA4MjAwMjU1MjZaFw0xOTA4MzExNDU5NTlaMB0xGzAZBgNVBAMTEnd3
- | dy5lLWt1amlyYS5vci5qcDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
- | AMH/cgKrX37R0quKUDHD/ab+tJZ8wiu/wC+vRa3vHqjmFvOLp3sO3lKQSyOYykmH
- | zb5rhbZpvwHApVlUHDC3+m1okP7bMPMiMbGZCR7gE5G+xjcjUJKtP90MuulgZO/H
- | IolypRnlgFjPQ3qTDTFJx7irozIvGEaIqQ7dIobUdz3Z6odnoRhtmz63T3lNXPp1
- | tl9q318CpVvTVM+4eYYqGXhSPXkTdEhEYRSYbTh+gEHWjIxbbawUvtAkZzuJGa/r
- | RUCJMbPr4FQxhuDJ/vqWiMnD8Mx4xGqCpPZKNgR+DFeOx8sQ933FhND/ETvzjhkf
- | kx4Fl5tqyZHycZPEDaM1qR8CAwEAAaOCAwIwggL+MB8GA1UdIwQYMBaAFLs66ldi
- | eAwyrR+ye/YdBiKW4avwMD0GCCsGAQUFBwEBBDEwLzAtBggrBgEFBQcwAYYhaHR0
- | cDovL2R2LmcyLm9jc3AucHViY2VydC5qcHJzLmpwMC0GA1UdEQQmMCSCEnd3dy5l
- | LWt1amlyYS5vci5qcIIOZS1rdWppcmEub3IuanAwWQYDVR0gBFIwUDBEBgoqgwiM
- | mxtugVADMDYwNAYIKwYBBQUHAgEWKGh0dHBzOi8vanBycy5qcC9wdWJjZXJ0L2lu
- | Zm8vcmVwb3NpdG9yeS8wCAYGZ4EMAQIBMBMGA1UdJQQMMAoGCCsGAQUFBwMBMEsG
- | A1UdHwREMEIwQKA+oDyGOmh0dHA6Ly9yZXBvLnB1YmNlcnQuanBycy5qcC9zcHBj
- | YS9qcHJzL2R2Y2FfZzIvZnVsbGNybC5jcmwwHQYDVR0OBBYEFKGubFIVt0jGq7Bm
- | oeO0fKD8ggb/MA4GA1UdDwEB/wQEAwIFoDCCAX8GCisGAQQB1nkCBAIEggFvBIIB
- | awFpAHYA3esdK3oNT6Ygi4GtgWhwfi6OnQHVXIiNPRHEzbbsvswAAAFlVUtdGQAA
- | BAMARzBFAiArPuNk3I0j0pxGEz6RoLcmAMlGB9ZGVHEY6O6tMph4WwIhAPPcj+Vx
- | jackoFeapNG+yJr8Z7yt946r14Kmq8YqXFW5AHcApLkJkLQYWBSHuxOizGdwCjw1
- | mAT5G9+443fNDsgN3BAAAAFlVUtgrwAABAMASDBGAiEAx8zhlb6M4MXvo6tmc/UB
- | 8dHqEA1Rouhu8PfaM6pBiuoCIQDWvViDqWtYjIGcSV7UbIV89wL/x8rW8w6dpoOm
- | J2j+/gB2AO5Lvbd1zmC64UJpH6vhnmajD35fsHLYgwDEe4l6qP3LAAABZVVLaNUA
- | AAQDAEcwRQIhAIp3JRCKbo8GRso2y7LqIbpFjOynIj6vXHcZLRGoRiElAiBL/vC2
- | DNRnHRzMdZpBvFoGLbR0owq8IUj4XGLcXPmjNTANBgkqhkiG9w0BAQsFAAOCAQEA
- | vEcuwZySSNLWWvp0dk5ucCP+m/e/hTH5R8RR0e8QbymBKMzj5vrY10W/5Kkju4H0
- | NGuDzUTDik5RpKLXYzsr8Jg5Iq1Gecxz6xRq91VVUi1iQJ28Y9jB7+EiCuGUfKHx
- | hfD0nVH1AWIJOBOnoWysVQyIQcPyJxAOPh+bC8C98Quwq0TBMAGuvy24WGXh6XJi
- | RzReqqRvN7YPURi5kZ8c3F9VIUKOxXN/88MkXSppXGKOxYNLQlY1ItImbDzAYxVK
- | FAe5BtAqMZOLfZ9M9paMfsI9ufdm0Sy0QP2M/iCCOgrJkUdWnUBIVwzeCvntX5fv
- | g45wttnh6EfFZju+HRt8tg==
- |_-----END CERTIFICATE-----
- |_ssl-date: 2019-01-17T19:19:27+00:00; 0s from scanner time.
- 445/tcp closed microsoft-ds conn-refused
- 587/tcp open smtp syn-ack netqmail smtpd 1.04
- | smtp-commands: e-kujira.or.jp, PIPELINING, 8BITMIME,
- |_ netqmail home page: http://qmail.org/netqmail
- 1025/tcp closed NFS-or-IIS conn-refused
- 1026/tcp closed LSA-or-nterm conn-refused
- 1027/tcp closed IIS conn-refused
- 1028/tcp closed unknown conn-refused
- 1029/tcp closed ms-lsa conn-refused
- 1030/tcp closed iad1 conn-refused
- 1031/tcp closed iad2 conn-refused
- 1032/tcp closed iad3 conn-refused
- 1033/tcp closed netinfo conn-refused
- 1034/tcp closed zincite-a conn-refused
- 1035/tcp closed multidropper conn-refused
- 1036/tcp closed nsstp conn-refused
- 1037/tcp closed ams conn-refused
- 1038/tcp closed mtqp conn-refused
- 1039/tcp closed sbl conn-refused
- 1040/tcp closed netsaint conn-refused
- 1041/tcp closed danf-ak2 conn-refused
- 1042/tcp closed afrog conn-refused
- 1043/tcp closed boinc conn-refused
- 1044/tcp closed dcutility conn-refused
- 1045/tcp closed fpitp conn-refused
- 1046/tcp closed wfremotertm conn-refused
- 1047/tcp closed neod1 conn-refused
- 1048/tcp closed neod2 conn-refused
- OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
- No OS matches for host
- TCP/IP fingerprint:
- SCAN(V=7.70SVN%E=4%D=1/17%OT=21%CT=22%CU=%PV=N%DS=17%DC=T%G=N%TM=5C40D544%P=x86_64-unknown-linux-gnu)
- SEQ(SP=FE%GCD=1%ISR=10F%TI=Z%TS=A)
- OPS(O1=M4B3ST11NW7%O2=M4B3ST11NW7%O3=M4B3NNT11NW7%O4=M4B3ST11NW7%O5=M4B3ST11NW7%O6=M4B3ST11)
- WIN(W1=3890%W2=3890%W3=3890%W4=3890%W5=3890%W6=3890)
- ECN(R=Y%DF=Y%TG=40%W=3908%O=M4B3NNSNW7%CC=Y%Q=)
- T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
- T2(R=N)
- T3(R=N)
- T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
- T5(R=N)
- T6(R=N)
- T7(R=N)
- U1(R=N)
- IE(R=N)
- Uptime guess: 46.705 days (since Sat Dec 1 21:24:36 2018)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=254 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Host: geirui-20161130; OS: Unix
- Host script results:
- |_clock-skew: mean: 0s, deviation: 0s, median: 0s
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 139.49 ms 10.244.200.1
- 2 139.89 ms 185.163.111.1
- 3 139.58 ms 172.30.244.193
- 4 139.57 ms 172.30.245.49
- 5 140.71 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 176.20 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 175.38 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 269.60 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 334.01 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 446.51 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 449.34 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 440.51 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 446.48 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 441.44 ms 210.152.243.182
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 14:19
- Completed NSE at 14:19, 0.00s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 14:19
- Completed NSE at 14:19, 0.00s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 14:19
- Completed NSE at 14:19, 0.00s elapsed
- Read data files from: /usr/local/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 127.76 seconds
- Raw packets sent: 107 (8.456KB) | Rcvd: 69 (5.126KB)
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 14:19 EST
- NSE: Loaded 149 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 14:19
- Completed NSE at 14:19, 0.00s elapsed
- Initiating NSE at 14:19
- Completed NSE at 14:19, 0.00s elapsed
- Initiating NSE at 14:19
- Completed NSE at 14:19, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 14:19
- Completed Parallel DNS resolution of 1 host. at 14:19, 16.50s elapsed
- Initiating UDP Scan at 14:19
- Scanning www.e-kujira.or.jp (210.152.243.182) [14 ports]
- Completed UDP Scan at 14:19, 3.44s elapsed (14 total ports)
- Initiating Service scan at 14:19
- Scanning 12 services on www.e-kujira.or.jp (210.152.243.182)
- Service scan Timing: About 8.33% done; ETC: 14:39 (0:17:58 remaining)
- Completed Service scan at 14:21, 102.58s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against www.e-kujira.or.jp (210.152.243.182)
- Retrying OS detection (try #2) against www.e-kujira.or.jp (210.152.243.182)
- Initiating Traceroute at 14:21
- Completed Traceroute at 14:21, 7.22s elapsed
- Initiating Parallel DNS resolution of 1 host. at 14:21
- Completed Parallel DNS resolution of 1 host. at 14:22, 16.50s elapsed
- NSE: Script scanning 210.152.243.182.
- Initiating NSE at 14:22
- Completed NSE at 14:25, 186.43s elapsed
- Initiating NSE at 14:25
- Completed NSE at 14:25, 2.01s elapsed
- Initiating NSE at 14:25
- Completed NSE at 14:25, 0.00s elapsed
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 138/udp)
- HOP RTT ADDRESS
- 1 139.58 ms 10.244.200.1
- 2 ... 3
- 4 142.90 ms 10.244.200.1
- 5 137.93 ms 10.244.200.1
- 6 137.93 ms 10.244.200.1
- 7 137.94 ms 10.244.200.1
- 8 137.93 ms 10.244.200.1
- 9 137.93 ms 10.244.200.1
- 10 137.94 ms 10.244.200.1
- 11 ... 18
- 19 140.07 ms 10.244.200.1
- 20 146.11 ms 10.244.200.1
- 21 ... 27
- 28 139.57 ms 10.244.200.1
- 29 ...
- 30 137.07 ms 10.244.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 14:25
- Completed NSE at 14:25, 0.00s elapsed
- Initiating NSE at 14:25
- Completed NSE at 14:25, 0.00s elapsed
- Initiating NSE at 14:25
- Completed NSE at 14:25, 0.00s elapsed
- Read data files from: /usr/local/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 343.56 seconds
- Raw packets sent: 141 (8.896KB) | Rcvd: 36 (3.160KB)
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 14:25 EST
- Nmap scan report for www.e-kujira.or.jp (210.152.243.182)
- Host is up (0.25s latency).
- Not shown: 19 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 80/tcp open http
- 110/tcp open pop3
- 443/tcp open https
- #######################################################################################################################################
- * default
- * default
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.10.0'
- [*] Importing host 210.152.243.182
- [*] Successfully imported /usr/share/sniper/loot/www.e-kujira.or.jp/nmap/nmap-www.e-kujira.or.jp.xml
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.10.0'
- [*] Importing host 210.152.243.182
- [*] Successfully imported /usr/share/sniper/loot/www.e-kujira.or.jp/nmap/nmap-www.e-kujira.or.jp-udp.xml
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.10.0'
- [*] Importing host 210.152.243.182
- [*] Successfully imported /usr/share/sniper/loot/www.e-kujira.or.jp/nmap/nmap-udp-www.e-kujira.or.jp.xml
- Hosts
- =====
- address mac name os_name os_flavor os_sp purpose info comments
- ------- --- ---- ------- --------- ----- ------- ---- --------
- 2.19.159.191 Linux 2.6.X server
- 45.60.151.214 45.60.151.214 Unknown device
- 45.60.155.214 45.60.155.214 Unknown device
- 50.23.207.250 server.subdimensionhosting.com Unknown device
- 64.111.113.208 64.111.113.208 Unknown device
- 69.163.248.88 dp-b8f0786b84.dream.press Linux 4.X server
- 74.200.39.23 agbank.com Linux 2.6.X server
- 74.200.39.24 bankofoxford.com Linux 2.6.X server
- 74.200.39.25 tcbssb.com Linux 2.6.X server
- 77.73.203.21 www.bde.es Linux 3.X server
- 85.159.192.76 www.bancaditalia.it Linux 3.X server
- 92.123.196.115 a92-123-196-115.deploy.static.akamaitechnologies.com Linux 2.6.X server
- 93.20.64.96 Linux 4.X server
- 93.20.64.97 embedded device
- 93.20.64.98 Linux 4.X server
- 93.20.64.99 Linux 4.X server
- 104.107.50.25 a104-107-50-25.deploy.static.akamaitechnologies.com Linux 2.6.X server
- 132.200.148.131 www.ffiec.gov Linux 2.6.X server
- 159.174.167.250 Linux 3.X server
- 162.144.12.212 162.144.12.212 Unknown device
- 162.211.86.202 host.inventiveground.com Linux 3.X server
- 184.154.229.101 101.229.154.184.unassigned.ord.singlehop.net Linux 2.6.X server
- 192.124.249.156 cloudproxy10156.sucuri.net Linux 3.X server
- 195.24.202.222 Linux 3.X server
- 198.71.232.3 ip-198-71-232-3.ip.secureserver.net Linux 2.6.X server
- 198.144.120.68 Unknown device
- 198.251.90.113 bitmitigate.com Linux 2.6.X server
- 199.169.201.171 Linux 3.X server
- 199.169.205.222 Linux 3.X server
- 209.59.165.178 rabbit.ceilingsky.com Linux 3.X server
- 210.152.243.182 Linux 3.X server
- Services
- ========
- host port proto name state info
- ---- ---- ----- ---- ----- ----
- 2.19.159.191 25 tcp smtp closed
- 2.19.159.191 53 udp domain unknown
- 2.19.159.191 67 udp dhcps unknown
- 2.19.159.191 68 udp dhcpc unknown
- 2.19.159.191 69 udp tftp unknown
- 2.19.159.191 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 2.19.159.191 88 udp kerberos-sec unknown
- 2.19.159.191 123 udp ntp unknown
- 2.19.159.191 137 udp netbios-ns filtered
- 2.19.159.191 138 udp netbios-dgm filtered
- 2.19.159.191 139 tcp netbios-ssn closed
- 2.19.159.191 139 udp netbios-ssn unknown
- 2.19.159.191 161 udp snmp unknown
- 2.19.159.191 162 udp snmptrap unknown
- 2.19.159.191 389 udp ldap unknown
- 2.19.159.191 443 tcp ssl/http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 2.19.159.191 445 tcp microsoft-ds closed
- 2.19.159.191 520 udp route unknown
- 2.19.159.191 2049 udp nfs unknown
- 45.60.151.214 8080 tcp http open ( 503-Service Unavailable )
- 45.60.155.214 8080 tcp http open ( 503-Service Unavailable )
- 50.23.207.250 53 udp domain unknown
- 50.23.207.250 67 udp dhcps unknown
- 50.23.207.250 68 udp dhcpc unknown
- 50.23.207.250 69 udp tftp unknown
- 50.23.207.250 88 udp kerberos-sec unknown
- 50.23.207.250 123 udp ntp unknown
- 50.23.207.250 137 udp netbios-ns filtered
- 50.23.207.250 138 udp netbios-dgm filtered
- 50.23.207.250 139 udp netbios-ssn unknown
- 50.23.207.250 161 udp snmp unknown
- 50.23.207.250 162 udp snmptrap unknown
- 50.23.207.250 389 udp ldap unknown
- 50.23.207.250 520 udp route unknown
- 50.23.207.250 2049 udp nfs unknown
- 64.111.113.208 8080 tcp http open Apache
- 69.163.248.88 22 tcp ssh closed
- 69.163.248.88 25 tcp smtp closed
- 69.163.248.88 53 udp domain unknown
- 69.163.248.88 67 udp dhcps unknown
- 69.163.248.88 68 udp dhcpc unknown
- 69.163.248.88 69 udp tftp unknown
- 69.163.248.88 80 tcp http-proxy open Squid http proxy
- 69.163.248.88 81 tcp hosts2-ns closed
- 69.163.248.88 88 udp kerberos-sec unknown
- 69.163.248.88 123 udp ntp unknown
- 69.163.248.88 137 udp netbios-ns filtered
- 69.163.248.88 138 udp netbios-dgm filtered
- 69.163.248.88 139 tcp netbios-ssn closed
- 69.163.248.88 139 udp netbios-ssn unknown
- 69.163.248.88 161 udp snmp unknown
- 69.163.248.88 162 udp snmptrap unknown
- 69.163.248.88 389 udp ldap unknown
- 69.163.248.88 443 tcp https closed
- 69.163.248.88 445 tcp microsoft-ds closed
- 69.163.248.88 520 udp route unknown
- 69.163.248.88 2049 udp nfs unknown
- 69.163.248.88 5001 tcp commplex-link closed
- 69.163.248.88 5666 tcp nrpe closed
- 69.163.248.88 60020 tcp unknown closed
- 69.163.248.88 60443 tcp unknown closed
- 74.200.39.23 25 tcp smtp closed
- 74.200.39.23 53 udp domain unknown
- 74.200.39.23 67 udp dhcps unknown
- 74.200.39.23 68 udp dhcpc unknown
- 74.200.39.23 69 udp tftp unknown
- 74.200.39.23 80 tcp http open nginx
- 74.200.39.23 88 udp kerberos-sec unknown
- 74.200.39.23 123 udp ntp unknown
- 74.200.39.23 137 udp netbios-ns filtered
- 74.200.39.23 138 udp netbios-dgm filtered
- 74.200.39.23 139 tcp netbios-ssn closed
- 74.200.39.23 139 udp netbios-ssn unknown
- 74.200.39.23 161 udp snmp unknown
- 74.200.39.23 162 udp snmptrap unknown
- 74.200.39.23 389 udp ldap unknown
- 74.200.39.23 443 tcp ssl/http open nginx
- 74.200.39.23 445 tcp microsoft-ds closed
- 74.200.39.23 520 udp route unknown
- 74.200.39.23 2049 udp nfs unknown
- 74.200.39.24 25 tcp smtp closed
- 74.200.39.24 53 udp domain unknown
- 74.200.39.24 67 udp dhcps unknown
- 74.200.39.24 68 udp dhcpc unknown
- 74.200.39.24 69 udp tftp unknown
- 74.200.39.24 80 tcp http open nginx
- 74.200.39.24 88 udp kerberos-sec unknown
- 74.200.39.24 123 udp ntp unknown
- 74.200.39.24 137 udp netbios-ns filtered
- 74.200.39.24 138 udp netbios-dgm filtered
- 74.200.39.24 139 tcp netbios-ssn closed
- 74.200.39.24 139 udp netbios-ssn unknown
- 74.200.39.24 161 udp snmp unknown
- 74.200.39.24 162 udp snmptrap unknown
- 74.200.39.24 389 udp ldap unknown
- 74.200.39.24 443 tcp ssl/http open nginx
- 74.200.39.24 445 tcp microsoft-ds closed
- 74.200.39.24 520 udp route unknown
- 74.200.39.24 2049 udp nfs unknown
- 74.200.39.25 25 tcp smtp closed
- 74.200.39.25 53 udp domain unknown
- 74.200.39.25 67 udp dhcps unknown
- 74.200.39.25 68 udp dhcpc unknown
- 74.200.39.25 69 udp tftp unknown
- 74.200.39.25 80 tcp http open nginx
- 74.200.39.25 88 udp kerberos-sec unknown
- 74.200.39.25 123 udp ntp unknown
- 74.200.39.25 137 udp netbios-ns filtered
- 74.200.39.25 138 udp netbios-dgm filtered
- 74.200.39.25 139 tcp netbios-ssn closed
- 74.200.39.25 139 udp netbios-ssn unknown
- 74.200.39.25 161 udp snmp unknown
- 74.200.39.25 162 udp snmptrap unknown
- 74.200.39.25 389 udp ldap unknown
- 74.200.39.25 443 tcp ssl/http open nginx
- 74.200.39.25 445 tcp microsoft-ds closed
- 74.200.39.25 520 udp route unknown
- 74.200.39.25 2049 udp nfs unknown
- 77.73.203.21 53 udp domain closed
- 77.73.203.21 67 udp dhcps closed
- 77.73.203.21 68 udp dhcpc closed
- 77.73.203.21 69 udp tftp closed
- 77.73.203.21 80 tcp http-proxy open Squid http proxy
- 77.73.203.21 88 udp kerberos-sec closed
- 77.73.203.21 123 udp ntp closed
- 77.73.203.21 137 udp netbios-ns filtered
- 77.73.203.21 138 udp netbios-dgm filtered
- 77.73.203.21 139 udp netbios-ssn closed
- 77.73.203.21 161 udp snmp closed
- 77.73.203.21 162 udp snmptrap closed
- 77.73.203.21 389 udp ldap closed
- 77.73.203.21 443 tcp ssl/https open
- 77.73.203.21 520 udp route closed
- 77.73.203.21 2049 udp nfs closed
- 85.159.192.76 25 tcp smtp closed
- 85.159.192.76 53 udp domain unknown
- 85.159.192.76 67 udp dhcps unknown
- 85.159.192.76 68 udp dhcpc unknown
- 85.159.192.76 69 udp tftp unknown
- 85.159.192.76 80 tcp http-proxy open Squid http proxy
- 85.159.192.76 88 udp kerberos-sec unknown
- 85.159.192.76 123 udp ntp unknown
- 85.159.192.76 137 udp netbios-ns filtered
- 85.159.192.76 138 udp netbios-dgm filtered
- 85.159.192.76 139 tcp netbios-ssn closed
- 85.159.192.76 139 udp netbios-ssn unknown
- 85.159.192.76 161 udp snmp unknown
- 85.159.192.76 162 udp snmptrap unknown
- 85.159.192.76 389 udp ldap unknown
- 85.159.192.76 445 tcp microsoft-ds closed
- 85.159.192.76 520 udp route unknown
- 85.159.192.76 2049 udp nfs unknown
- 92.123.196.115 25 tcp smtp closed
- 92.123.196.115 53 udp domain unknown
- 92.123.196.115 67 udp dhcps unknown
- 92.123.196.115 68 udp dhcpc unknown
- 92.123.196.115 69 udp tftp unknown
- 92.123.196.115 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 92.123.196.115 88 udp kerberos-sec unknown
- 92.123.196.115 123 udp ntp unknown
- 92.123.196.115 137 udp netbios-ns filtered
- 92.123.196.115 138 udp netbios-dgm filtered
- 92.123.196.115 139 tcp netbios-ssn closed
- 92.123.196.115 139 udp netbios-ssn unknown
- 92.123.196.115 161 udp snmp unknown
- 92.123.196.115 162 udp snmptrap unknown
- 92.123.196.115 389 udp ldap unknown
- 92.123.196.115 443 tcp ssl/http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 92.123.196.115 445 tcp microsoft-ds closed
- 92.123.196.115 520 udp route unknown
- 92.123.196.115 2049 udp nfs unknown
- 93.20.64.96 25 tcp smtp closed
- 93.20.64.96 53 udp domain unknown
- 93.20.64.96 67 udp dhcps unknown
- 93.20.64.96 68 udp dhcpc unknown
- 93.20.64.96 69 udp tftp unknown
- 93.20.64.96 80 tcp http-proxy open Varnish http accelerator
- 93.20.64.96 88 udp kerberos-sec unknown
- 93.20.64.96 113 tcp ident closed
- 93.20.64.96 123 udp ntp unknown
- 93.20.64.96 137 udp netbios-ns filtered
- 93.20.64.96 138 udp netbios-dgm filtered
- 93.20.64.96 139 tcp netbios-ssn closed
- 93.20.64.96 139 udp netbios-ssn unknown
- 93.20.64.96 161 udp snmp unknown
- 93.20.64.96 162 udp snmptrap unknown
- 93.20.64.96 389 udp ldap unknown
- 93.20.64.96 443 tcp ssl/http open nginx 1.10.3
- 93.20.64.96 445 tcp microsoft-ds closed
- 93.20.64.96 520 udp route unknown
- 93.20.64.96 2049 udp nfs unknown
- 93.20.64.97 25 tcp smtp closed
- 93.20.64.97 53 udp domain unknown
- 93.20.64.97 67 udp dhcps unknown
- 93.20.64.97 68 udp dhcpc unknown
- 93.20.64.97 69 udp tftp unknown
- 93.20.64.97 80 tcp http-proxy open Varnish http accelerator
- 93.20.64.97 88 udp kerberos-sec unknown
- 93.20.64.97 113 tcp ident closed
- 93.20.64.97 123 udp ntp unknown
- 93.20.64.97 137 udp netbios-ns filtered
- 93.20.64.97 138 udp netbios-dgm filtered
- 93.20.64.97 139 tcp netbios-ssn closed
- 93.20.64.97 139 udp netbios-ssn unknown
- 93.20.64.97 161 udp snmp unknown
- 93.20.64.97 162 udp snmptrap unknown
- 93.20.64.97 389 udp ldap unknown
- 93.20.64.97 443 tcp ssl/http open nginx 1.10.3
- 93.20.64.97 445 tcp microsoft-ds closed
- 93.20.64.97 520 udp route unknown
- 93.20.64.97 2049 udp nfs unknown
- 93.20.64.98 25 tcp smtp closed
- 93.20.64.98 53 udp domain unknown
- 93.20.64.98 67 udp dhcps unknown
- 93.20.64.98 68 udp dhcpc unknown
- 93.20.64.98 69 udp tftp unknown
- 93.20.64.98 80 tcp http-proxy open Varnish http accelerator
- 93.20.64.98 88 udp kerberos-sec unknown
- 93.20.64.98 113 tcp ident closed
- 93.20.64.98 123 udp ntp unknown
- 93.20.64.98 137 udp netbios-ns filtered
- 93.20.64.98 138 udp netbios-dgm filtered
- 93.20.64.98 139 tcp netbios-ssn closed
- 93.20.64.98 139 udp netbios-ssn unknown
- 93.20.64.98 161 udp snmp unknown
- 93.20.64.98 162 udp snmptrap unknown
- 93.20.64.98 389 udp ldap unknown
- 93.20.64.98 443 tcp ssl/http open nginx 1.10.3
- 93.20.64.98 445 tcp microsoft-ds closed
- 93.20.64.98 520 udp route unknown
- 93.20.64.98 2049 udp nfs unknown
- 93.20.64.99 25 tcp smtp closed
- 93.20.64.99 53 udp domain unknown
- 93.20.64.99 67 udp dhcps unknown
- 93.20.64.99 68 udp dhcpc unknown
- 93.20.64.99 69 udp tftp unknown
- 93.20.64.99 80 tcp http-proxy open Varnish http accelerator
- 93.20.64.99 88 udp kerberos-sec unknown
- 93.20.64.99 113 tcp ident closed
- 93.20.64.99 123 udp ntp unknown
- 93.20.64.99 137 udp netbios-ns filtered
- 93.20.64.99 138 udp netbios-dgm filtered
- 93.20.64.99 139 tcp netbios-ssn closed
- 93.20.64.99 139 udp netbios-ssn unknown
- 93.20.64.99 161 udp snmp unknown
- 93.20.64.99 162 udp snmptrap unknown
- 93.20.64.99 389 udp ldap unknown
- 93.20.64.99 443 tcp ssl/http open nginx 1.10.3
- 93.20.64.99 445 tcp microsoft-ds closed
- 93.20.64.99 520 udp route unknown
- 93.20.64.99 2049 udp nfs unknown
- 104.107.50.25 25 tcp smtp closed
- 104.107.50.25 53 udp domain unknown
- 104.107.50.25 67 udp dhcps unknown
- 104.107.50.25 68 udp dhcpc unknown
- 104.107.50.25 69 udp tftp unknown
- 104.107.50.25 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 104.107.50.25 88 udp kerberos-sec unknown
- 104.107.50.25 123 udp ntp unknown
- 104.107.50.25 137 udp netbios-ns filtered
- 104.107.50.25 138 udp netbios-dgm filtered
- 104.107.50.25 139 tcp netbios-ssn closed
- 104.107.50.25 139 udp netbios-ssn unknown
- 104.107.50.25 161 udp snmp unknown
- 104.107.50.25 162 udp snmptrap unknown
- 104.107.50.25 389 udp ldap unknown
- 104.107.50.25 443 tcp ssl/http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 104.107.50.25 445 tcp microsoft-ds closed
- 104.107.50.25 520 udp route unknown
- 104.107.50.25 2049 udp nfs unknown
- 132.200.148.131 25 tcp smtp closed
- 132.200.148.131 53 udp domain unknown
- 132.200.148.131 67 udp dhcps unknown
- 132.200.148.131 68 udp dhcpc unknown
- 132.200.148.131 69 udp tftp unknown
- 132.200.148.131 80 tcp http-proxy open F5 BIG-IP load balancer http proxy
- 132.200.148.131 88 udp kerberos-sec unknown
- 132.200.148.131 123 udp ntp unknown
- 132.200.148.131 137 udp netbios-ns filtered
- 132.200.148.131 138 udp netbios-dgm filtered
- 132.200.148.131 139 tcp netbios-ssn closed
- 132.200.148.131 139 udp netbios-ssn unknown
- 132.200.148.131 161 udp snmp unknown
- 132.200.148.131 162 udp snmptrap unknown
- 132.200.148.131 389 udp ldap unknown
- 132.200.148.131 443 tcp ssl/https open
- 132.200.148.131 445 tcp microsoft-ds closed
- 132.200.148.131 520 udp route unknown
- 132.200.148.131 2049 udp nfs unknown
- 159.174.167.250 25 tcp smtp closed
- 159.174.167.250 53 udp domain open
- 159.174.167.250 67 udp dhcps unknown
- 159.174.167.250 68 udp dhcpc unknown
- 159.174.167.250 69 udp tftp unknown
- 159.174.167.250 80 tcp http-proxy open Squid http proxy
- 159.174.167.250 88 udp kerberos-sec unknown
- 159.174.167.250 123 udp ntp unknown
- 159.174.167.250 137 udp netbios-ns filtered
- 159.174.167.250 138 udp netbios-dgm filtered
- 159.174.167.250 139 tcp netbios-ssn closed
- 159.174.167.250 139 udp netbios-ssn unknown
- 159.174.167.250 161 udp snmp unknown
- 159.174.167.250 162 udp snmptrap unknown
- 159.174.167.250 389 udp ldap unknown
- 159.174.167.250 445 tcp microsoft-ds closed
- 159.174.167.250 520 udp route unknown
- 159.174.167.250 2049 udp nfs unknown
- 162.144.12.212 8080 tcp http open nginx/1.14.1 ( 302-/404.html )
- 162.211.86.202 25 tcp smtp closed
- 162.211.86.202 53 udp domain unknown
- 162.211.86.202 67 udp dhcps unknown
- 162.211.86.202 68 udp dhcpc unknown
- 162.211.86.202 69 udp tftp unknown
- 162.211.86.202 80 tcp http open Fortinet FortiGate 50B or FortiWifi 60C or 80C firewall http config
- 162.211.86.202 88 udp kerberos-sec unknown
- 162.211.86.202 123 udp ntp unknown
- 162.211.86.202 137 udp netbios-ns filtered
- 162.211.86.202 138 udp netbios-dgm filtered
- 162.211.86.202 139 tcp netbios-ssn closed
- 162.211.86.202 139 udp netbios-ssn unknown
- 162.211.86.202 161 udp snmp unknown
- 162.211.86.202 162 udp snmptrap unknown
- 162.211.86.202 389 udp ldap unknown
- 162.211.86.202 445 tcp microsoft-ds closed
- 162.211.86.202 520 udp route unknown
- 162.211.86.202 2049 udp nfs unknown
- 184.154.229.101 25 tcp smtp closed
- 184.154.229.101 53 tcp domain open unknown banner: donuts
- 184.154.229.101 53 udp domain open unknown banner: donuts
- 184.154.229.101 67 udp dhcps unknown
- 184.154.229.101 68 udp dhcpc unknown
- 184.154.229.101 69 udp tftp unknown
- 184.154.229.101 80 tcp http-proxy open Squid http proxy
- 184.154.229.101 88 udp kerberos-sec unknown
- 184.154.229.101 111 tcp rpcbind closed
- 184.154.229.101 123 udp ntp unknown
- 184.154.229.101 137 udp netbios-ns filtered
- 184.154.229.101 138 udp netbios-dgm filtered
- 184.154.229.101 139 tcp netbios-ssn closed
- 184.154.229.101 139 udp netbios-ssn unknown
- 184.154.229.101 143 tcp imap open Dovecot imapd
- 184.154.229.101 161 udp snmp unknown
- 184.154.229.101 162 udp snmptrap unknown
- 184.154.229.101 389 udp ldap unknown
- 184.154.229.101 443 tcp ssl/http open nginx
- 184.154.229.101 445 tcp microsoft-ds closed
- 184.154.229.101 465 tcp ssl/smtp open
- 184.154.229.101 520 udp route unknown
- 184.154.229.101 587 tcp smtp open
- 184.154.229.101 993 tcp ssl/imap open Dovecot imapd
- 184.154.229.101 2049 udp nfs unknown
- 184.154.229.101 2525 tcp smtp open
- 184.154.229.101 4001 tcp newoak closed
- 184.154.229.101 5432 tcp postgresql closed
- 184.154.229.101 34571 tcp unknown closed
- 184.154.229.101 34572 tcp unknown closed
- 184.154.229.101 34573 tcp unknown closed
- 192.124.249.156 25 tcp smtp closed
- 192.124.249.156 53 udp domain unknown
- 192.124.249.156 67 udp dhcps unknown
- 192.124.249.156 68 udp dhcpc unknown
- 192.124.249.156 69 udp tftp unknown
- 192.124.249.156 80 tcp http-proxy open Squid http proxy
- 192.124.249.156 88 udp kerberos-sec unknown
- 192.124.249.156 123 udp ntp unknown
- 192.124.249.156 137 udp netbios-ns filtered
- 192.124.249.156 138 udp netbios-dgm filtered
- 192.124.249.156 139 tcp netbios-ssn closed
- 192.124.249.156 139 udp netbios-ssn unknown
- 192.124.249.156 161 udp snmp unknown
- 192.124.249.156 162 udp snmptrap unknown
- 192.124.249.156 389 udp ldap unknown
- 192.124.249.156 445 tcp microsoft-ds closed
- 192.124.249.156 520 udp route unknown
- 192.124.249.156 2049 udp nfs unknown
- 195.24.202.222 25 tcp smtp closed
- 195.24.202.222 53 udp domain unknown
- 195.24.202.222 67 udp dhcps unknown
- 195.24.202.222 68 udp dhcpc unknown
- 195.24.202.222 69 udp tftp unknown
- 195.24.202.222 80 tcp http-proxy open Squid http proxy
- 195.24.202.222 88 udp kerberos-sec unknown
- 195.24.202.222 123 udp ntp unknown
- 195.24.202.222 137 udp netbios-ns filtered
- 195.24.202.222 138 udp netbios-dgm filtered
- 195.24.202.222 139 tcp netbios-ssn closed
- 195.24.202.222 139 udp netbios-ssn unknown
- 195.24.202.222 161 udp snmp unknown
- 195.24.202.222 162 udp snmptrap unknown
- 195.24.202.222 389 udp ldap unknown
- 195.24.202.222 443 tcp ssl/http open Apache httpd
- 195.24.202.222 445 tcp microsoft-ds closed
- 195.24.202.222 520 udp route unknown
- 195.24.202.222 2049 udp nfs unknown
- 198.71.232.3 25 tcp smtp closed
- 198.71.232.3 53 udp domain unknown
- 198.71.232.3 67 udp dhcps unknown
- 198.71.232.3 68 udp dhcpc unknown
- 198.71.232.3 69 udp tftp unknown
- 198.71.232.3 80 tcp http open Samsung AllShare httpd
- 198.71.232.3 88 udp kerberos-sec unknown
- 198.71.232.3 123 udp ntp unknown
- 198.71.232.3 137 udp netbios-ns filtered
- 198.71.232.3 138 udp netbios-dgm filtered
- 198.71.232.3 139 tcp netbios-ssn closed
- 198.71.232.3 139 udp netbios-ssn unknown
- 198.71.232.3 161 udp snmp unknown
- 198.71.232.3 162 udp snmptrap unknown
- 198.71.232.3 389 udp ldap unknown
- 198.71.232.3 443 tcp ssl/http open Samsung AllShare httpd
- 198.71.232.3 445 tcp microsoft-ds closed
- 198.71.232.3 520 udp route unknown
- 198.71.232.3 2049 udp nfs unknown
- 198.144.120.68 53 udp domain unknown
- 198.144.120.68 67 udp dhcps unknown
- 198.144.120.68 68 udp dhcpc unknown
- 198.144.120.68 69 udp tftp unknown
- 198.144.120.68 88 udp kerberos-sec unknown
- 198.144.120.68 123 udp ntp unknown
- 198.144.120.68 137 udp netbios-ns filtered
- 198.144.120.68 138 udp netbios-dgm filtered
- 198.144.120.68 139 udp netbios-ssn unknown
- 198.144.120.68 161 udp snmp unknown
- 198.144.120.68 162 udp snmptrap unknown
- 198.144.120.68 389 udp ldap unknown
- 198.144.120.68 520 udp route unknown
- 198.144.120.68 2049 udp nfs unknown
- 198.251.90.113 22 tcp tcpwrapped open OpenSSH 6.7p1 Debian 5+deb8u7 protocol 2.0
- 198.251.90.113 53 udp domain closed
- 198.251.90.113 67 udp dhcps closed
- 198.251.90.113 68 udp dhcpc unknown
- 198.251.90.113 69 udp tftp closed
- 198.251.90.113 80 tcp http open nginx 1.14.2
- 198.251.90.113 88 udp kerberos-sec closed
- 198.251.90.113 123 udp ntp closed
- 198.251.90.113 137 udp netbios-ns filtered
- 198.251.90.113 138 udp netbios-dgm filtered
- 198.251.90.113 139 udp netbios-ssn closed
- 198.251.90.113 161 udp snmp closed
- 198.251.90.113 162 udp snmptrap closed
- 198.251.90.113 389 udp ldap closed
- 198.251.90.113 443 tcp ssl/http open nginx 1.14.2
- 198.251.90.113 520 udp route closed
- 198.251.90.113 1272 tcp cspmlockmgr filtered
- 198.251.90.113 2049 udp nfs closed
- 198.251.90.113 4998 tcp maybe-veritas filtered
- 198.251.90.113 8082 tcp blackice-alerts filtered
- 198.251.90.113 16992 tcp amt-soap-http filtered
- 199.169.201.171 25 tcp smtp closed
- 199.169.201.171 42 tcp tcpwrapped open
- 199.169.201.171 53 udp domain unknown
- 199.169.201.171 67 udp dhcps unknown
- 199.169.201.171 68 udp dhcpc unknown
- 199.169.201.171 69 udp tftp unknown
- 199.169.201.171 80 tcp http-proxy open Squid http proxy
- 199.169.201.171 81 tcp tcpwrapped open
- 199.169.201.171 88 udp kerberos-sec unknown
- 199.169.201.171 123 udp ntp filtered
- 199.169.201.171 137 udp netbios-ns filtered
- 199.169.201.171 138 udp netbios-dgm filtered
- 199.169.201.171 139 tcp netbios-ssn closed
- 199.169.201.171 139 udp netbios-ssn unknown
- 199.169.201.171 161 udp snmp unknown
- 199.169.201.171 162 udp snmptrap unknown
- 199.169.201.171 389 udp ldap unknown
- 199.169.201.171 416 tcp tcpwrapped open
- 199.169.201.171 443 tcp ssl/http open Microsoft IIS httpd 7.5
- 199.169.201.171 445 tcp microsoft-ds closed
- 199.169.201.171 520 udp route unknown
- 199.169.201.171 625 tcp tcpwrapped open
- 199.169.201.171 691 tcp tcpwrapped open
- 199.169.201.171 1044 tcp tcpwrapped open
- 199.169.201.171 1045 tcp tcpwrapped open
- 199.169.201.171 1067 tcp tcpwrapped open
- 199.169.201.171 1583 tcp tcpwrapped open
- 199.169.201.171 2049 udp nfs unknown
- 199.169.201.171 3269 tcp tcpwrapped open
- 199.169.201.171 3826 tcp tcpwrapped open
- 199.169.201.171 5221 tcp tcpwrapped open
- 199.169.201.171 6689 tcp tcpwrapped open
- 199.169.201.171 7937 tcp tcpwrapped open
- 199.169.201.171 8022 tcp tcpwrapped open
- 199.169.201.171 8290 tcp tcpwrapped open
- 199.169.201.171 8649 tcp tcpwrapped open
- 199.169.201.171 9110 tcp tcpwrapped open
- 199.169.201.171 9593 tcp tcpwrapped open
- 199.169.201.171 10025 tcp tcpwrapped open
- 199.169.201.171 16016 tcp tcpwrapped open
- 199.169.201.171 16080 tcp tcpwrapped open
- 199.169.201.171 34572 tcp tcpwrapped open
- 199.169.201.171 44442 tcp tcpwrapped open
- 199.169.205.222 25 tcp smtp closed
- 199.169.205.222 53 udp domain unknown
- 199.169.205.222 67 udp dhcps unknown
- 199.169.205.222 68 udp dhcpc unknown
- 199.169.205.222 69 udp tftp unknown
- 199.169.205.222 80 tcp nagios-nsca open Nagios NSCA
- 199.169.205.222 88 udp kerberos-sec unknown
- 199.169.205.222 123 udp ntp unknown
- 199.169.205.222 137 udp netbios-ns unknown
- 199.169.205.222 138 udp netbios-dgm unknown
- 199.169.205.222 139 tcp netbios-ssn closed
- 199.169.205.222 139 udp netbios-ssn unknown
- 199.169.205.222 161 udp snmp unknown
- 199.169.205.222 162 udp snmptrap unknown
- 199.169.205.222 389 udp ldap unknown
- 199.169.205.222 443 tcp ssl/https open
- 199.169.205.222 445 tcp microsoft-ds closed
- 199.169.205.222 520 udp route unknown
- 199.169.205.222 2049 udp nfs unknown
- 209.59.165.178 25 tcp smtp closed
- 209.59.165.178 53 udp domain unknown
- 209.59.165.178 67 udp dhcps unknown
- 209.59.165.178 68 udp dhcpc unknown
- 209.59.165.178 69 udp tftp unknown
- 209.59.165.178 80 tcp http-proxy open Squid http proxy
- 209.59.165.178 88 udp kerberos-sec unknown
- 209.59.165.178 123 udp ntp unknown
- 209.59.165.178 137 udp netbios-ns filtered
- 209.59.165.178 138 udp netbios-dgm filtered
- 209.59.165.178 139 tcp netbios-ssn closed
- 209.59.165.178 139 udp netbios-ssn unknown
- 209.59.165.178 161 udp snmp unknown
- 209.59.165.178 162 udp snmptrap unknown
- 209.59.165.178 389 udp ldap unknown
- 209.59.165.178 445 tcp microsoft-ds closed
- 209.59.165.178 520 udp route unknown
- 209.59.165.178 2049 udp nfs unknown
- 210.152.243.182 21 tcp ftp open vsftpd 2.2.2
- 210.152.243.182 22 tcp ssh closed
- 210.152.243.182 25 tcp smtp closed
- 210.152.243.182 53 udp domain unknown
- 210.152.243.182 67 udp dhcps unknown
- 210.152.243.182 68 udp dhcpc unknown
- 210.152.243.182 69 udp tftp unknown
- 210.152.243.182 80 tcp http-proxy open Squid http proxy
- 210.152.243.182 88 udp kerberos-sec unknown
- 210.152.243.182 110 tcp pop3 open qmail pop3d
- 210.152.243.182 123 udp ntp unknown
- 210.152.243.182 137 udp netbios-ns filtered
- 210.152.243.182 138 udp netbios-dgm filtered
- 210.152.243.182 139 tcp netbios-ssn closed
- 210.152.243.182 139 udp netbios-ssn unknown
- 210.152.243.182 161 udp snmp unknown
- 210.152.243.182 162 udp snmptrap unknown
- 210.152.243.182 389 udp ldap unknown
- 210.152.243.182 443 tcp ssl/ssl open Apache httpd SSL-only mode
- 210.152.243.182 445 tcp microsoft-ds closed
- 210.152.243.182 520 udp route unknown
- 210.152.243.182 587 tcp smtp open netqmail smtpd 1.04
- 210.152.243.182 1025 tcp nfs-or-iis closed
- 210.152.243.182 1026 tcp lsa-or-nterm closed
- 210.152.243.182 1027 tcp iis closed
- 210.152.243.182 1028 tcp unknown closed
- 210.152.243.182 1029 tcp ms-lsa closed
- 210.152.243.182 1030 tcp iad1 closed
- 210.152.243.182 1031 tcp iad2 closed
- 210.152.243.182 1032 tcp iad3 closed
- 210.152.243.182 1033 tcp netinfo closed
- 210.152.243.182 1034 tcp zincite-a closed
- 210.152.243.182 1035 tcp multidropper closed
- 210.152.243.182 1036 tcp nsstp closed
- 210.152.243.182 1037 tcp ams closed
- 210.152.243.182 1038 tcp mtqp closed
- 210.152.243.182 1039 tcp sbl closed
- 210.152.243.182 1040 tcp netsaint closed
- 210.152.243.182 1041 tcp danf-ak2 closed
- 210.152.243.182 1042 tcp afrog closed
- 210.152.243.182 1043 tcp boinc closed
- 210.152.243.182 1044 tcp dcutility closed
- 210.152.243.182 1045 tcp fpitp closed
- 210.152.243.182 1046 tcp wfremotertm closed
- 210.152.243.182 1047 tcp neod1 closed
- 210.152.243.182 1048 tcp neod2 closed
- 210.152.243.182 2049 udp nfs unknown
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:34 EST
- Nmap scan report for 210.152.243.182
- Host is up (0.44s latency).
- Not shown: 465 filtered ports, 5 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 80/tcp open http
- 110/tcp open pop3
- 443/tcp open https
- 587/tcp open submission
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:36 EST
- Nmap scan report for 210.152.243.182
- Host is up (0.15s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:37 EST
- NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
- NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
- NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
- Nmap scan report for 210.152.243.182
- Host is up (0.41s latency).
- PORT STATE SERVICE VERSION
- 21/tcp open ftp vsftpd 2.2.2
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 1876 guesses in 182 seconds, average tps: 8.9
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|WAP|storage-misc|specialized
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), Ruckus embedded (91%), Synology DiskStation Manager 5.X (89%), Crestron 2-Series (87%), Asus embedded (86%), HP embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/h:ruckus:zoneflex_r710 cpe:/a:synology:diskstation_manager:5.2 cpe:/o:crestron:2_series cpe:/h:asus:rt-n56u cpe:/o:linux:linux_kernel:3.4 cpe:/h:hp:p2000_g3
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.32 - 3.1 (91%), Linux 3.10 (91%), Linux 3.2 (91%), Linux 3.4 - 3.10 (91%), Linux 3.5 (91%), Linux 3.8 (91%), Ruckus ZoneFlex R710 WAP (Linux 3.4) (91%), Linux 2.6.32 - 3.10 (90%), Linux 2.6.32 - 3.13 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 18 hops
- Service Info: OS: Unix
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 143.17 ms 10.244.200.1
- 2 143.49 ms 185.163.111.1
- 3 143.23 ms 172.30.244.193
- 4 143.22 ms 172.30.245.53
- 5 143.54 ms te5-13-0-bb1.buc1.ro.m247.ro (83.217.231.89)
- 6 181.43 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 180.06 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 179.42 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 9 277.64 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 10 443.10 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 441.15 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 12 441.07 ms ae-2.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.106)
- 13 473.60 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 473.62 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 15 ... 17
- 18 446.58 ms 210.152.243.182
- #######################################################################################################################################
- # general
- (gen) banner: SSH-2.0-OpenSSH_5.3
- (gen) software: OpenSSH 5.3
- (gen) compatibility: OpenSSH 5.9-6.6, Dropbear SSH 2013.56+
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- # message authentication code algorithms
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- # algorithm recommendations (for OpenSSH 5.3)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:41 EST
- Nmap scan report for 210.152.243.182
- Host is up (0.40s latency).
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 141.45 ms 10.244.200.1
- 2 142.26 ms 185.163.111.1
- 3 142.04 ms 172.30.244.193
- 4 142.02 ms 172.30.245.49
- 5 142.25 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 178.51 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 177.11 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 271.54 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 335.94 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 448.61 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 447.14 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 438.85 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 443.62 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 436.82 ms 210.152.243.182
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:42 EST
- Nmap scan report for 210.152.243.182
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 138.72 ms 10.244.200.1
- 2 139.29 ms 185.163.111.1
- 3 138.90 ms 172.30.244.193
- 4 138.92 ms 172.30.245.49
- 5 139.32 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 175.40 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 174.40 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 268.22 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 333.19 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 445.80 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 445.29 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 437.00 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 441.80 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 432.55 ms 210.152.243.182
- ######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:45 EST
- Nmap scan report for 210.152.243.182
- Host is up (0.22s latency).
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 140.02 ms 10.244.200.1
- 2 140.32 ms 185.163.111.1
- 3 140.11 ms 172.30.244.193
- 4 140.14 ms 172.30.245.49
- 5 140.58 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 178.68 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 180.06 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 269.47 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 334.39 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 447.84 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 449.11 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 443.83 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 445.83 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 431.25 ms 210.152.243.182
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:47 EST
- Nmap scan report for 210.152.243.182
- Host is up (0.22s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 142.94 ms 10.244.200.1
- 2 143.15 ms 185.163.111.1
- 3 143.11 ms 172.30.244.193
- 4 143.09 ms 172.30.245.49
- 5 143.15 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 179.62 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 178.65 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 272.41 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 339.29 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 450.58 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 446.77 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 439.61 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 443.07 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 434.58 ms 210.152.243.182
- ######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://210.152.243.182
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 17
- #######################################################################################################################################
- http://210.152.243.182 [302 Found] Country[JAPAN][JP], IP[210.152.243.182], RedirectLocation[https://210.152.243.182/], Title[302 Found]
- https://210.152.243.182/ [200 OK] Apache[2.2], Content-Language[ja], Country[JAPAN][JP], Frame, Google-Analytics[UA-19915938-1], HTTPServer[Apache], IP[210.152.243.182], PHP[5,5.1,5.1.6], Script[text/javascript], Title[\A4\AF\A4\B8\A4\E9\A5١\BC\A5\B3\A5\F3\A4ʤɷ\DF\C6\F9\A4\F2\BBȤä\BF\B7\DF\CE\C1\CD\FD\A4Υ쥷\A5Ԥ\AB\A4\E9\C4\CC\C8Τޤǡ\A2\A5\AF\A5\B8\A5\E9\A4Τ\B3\A4Ȥʤ餯\A4\B8\A4鲣\C3\FA\A4ޤǡ\A3], X-Powered-By[PHP/5.1.6]
- #######################################################################################################################################
- HTTP/1.1 302 Found
- Date: Thu, 17 Jan 2019 18:50:58 GMT
- Location: https://210.152.243.182/
- Content-Type: text/html; charset=iso-8859-1
- Connection: keep-alive
- ######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:51 EST
- NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
- NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
- NSE: [pop3-brute] passwords: Time limit 3m00s exceeded.
- Nmap scan report for 210.152.243.182
- Host is up (0.15s latency).
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 qmail pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 1946 guesses in 180 seconds, average tps: 10.5
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|WAP|storage-misc|specialized
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), Ruckus embedded (91%), Synology DiskStation Manager 5.X (89%), Crestron 2-Series (87%), Asus embedded (86%), HP embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/h:ruckus:zoneflex_r710 cpe:/a:synology:diskstation_manager:5.2 cpe:/o:crestron:2_series cpe:/h:asus:rt-n56u cpe:/o:linux:linux_kernel:3.4 cpe:/h:hp:p2000_g3
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.32 - 3.1 (91%), Linux 3.10 (91%), Linux 3.2 (91%), Linux 3.4 - 3.10 (91%), Linux 3.8 (91%), Ruckus ZoneFlex R710 WAP (Linux 3.4) (91%), Linux 2.6.32 - 3.10 (90%), Linux 2.6.32 - 3.13 (90%), Linux 2.6.32 - 3.9 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 1 hop
- Service Info: Host: geirui-20161130
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 142.99 ms 210.152.243.182
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 13:54 EST
- Nmap scan report for 210.152.243.182
- Host is up (0.22s latency).
- PORT STATE SERVICE VERSION
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 139.93 ms 10.244.200.1
- 2 140.12 ms 185.163.111.1
- 3 139.97 ms 172.30.244.193
- 4 139.96 ms 172.30.245.49
- 5 140.58 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 181.61 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 175.80 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 269.22 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 334.02 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 447.98 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 453.63 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 446.39 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 449.75 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 431.61 ms 210.152.243.182
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://210.152.243.182
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 14
- #######################################################################################################################################
- https://210.152.243.182 [200 OK] Apache[2.2], Content-Language[ja], Country[JAPAN][JP], Frame, Google-Analytics[UA-19915938-1], HTTPServer[Apache], IP[210.152.243.182], PHP[5,5.1,5.1.6], Script[text/javascript], Title[\A4\AF\A4\B8\A4\E9\A5١\BC\A5\B3\A5\F3\A4ʤɷ\DF\C6\F9\A4\F2\BBȤä\BF\B7\DF\CE\C1\CD\FD\A4Υ쥷\A5Ԥ\AB\A4\E9\C4\CC\C8Τޤǡ\A2\A5\AF\A5\B8\A5\E9\A4Τ\B3\A4Ȥʤ餯\A4\B8\A4鲣\C3\FA\A4ޤǡ\A3], X-Powered-By[PHP/5.1.6]
- ######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- PluginSessionResumption
- PluginOpenSSLCipherSuites
- PluginCertInfo
- PluginChromeSha1Deprecation
- PluginCompression
- PluginSessionRenegotiation
- PluginHeartbleed
- PluginHSTS
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- 210.152.243.182:443 => 210.152.243.182:443
- SCAN RESULTS FOR 210.152.243.182:443 - 210.152.243.182:443
- ----------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: fad1e751921a293a507fa7437cdd12faa572d5af
- Common Name: www.e-kujira.or.jp
- Issuer: JPRS Domain Validation Authority - G2
- Serial Number: 5FB6439EFD0FC68A
- Not Before: Aug 20 02:55:26 2018 GMT
- Not After: Aug 31 14:59:59 2019 GMT
- Signature Algorithm: sha256WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- X509v3 Subject Alternative Name: {'DNS': ['www.e-kujira.or.jp', 'e-kujira.or.jp']}
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match 210.152.243.182
- Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Java 6 CA Store (Update 65): OK - Certificate is trusted
- Microsoft CA Store (09/2015): OK - Certificate is trusted
- Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
- Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
- Certificate Chain Received: ['www.e-kujira.or.jp', 'JPRS Domain Validation Authority - G2']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * OpenSSL Heartbleed:
- OK - Not vulnerable to Heartbleed
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: OK - Supported
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * TLSV1_2 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES256-GCM-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- ECDHE-RSA-AES256-GCM-SHA384 ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA256 DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-GCM-SHA384 DH-2048 bits 256 bits HTTP 200 OK
- AES256-SHA256 - 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- AES256-GCM-SHA384 - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- ECDHE-RSA-AES128-GCM-SHA256 ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA256 DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-GCM-SHA256 DH-2048 bits 128 bits HTTP 200 OK
- AES128-SHA256 - 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- AES128-GCM-SHA256 - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- EDH-RSA-DES-CBC3-SHA DH-2048 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- * TLSV1_1 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- EDH-RSA-DES-CBC3-SHA DH-2048 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- * TLSV1 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- Accepted:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits HTTP 200 OK
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits HTTP 200 OK
- AES256-SHA - 256 bits HTTP 200 OK
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits HTTP 200 OK
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits HTTP 200 OK
- AES128-SHA - 128 bits HTTP 200 OK
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits HTTP 200 OK
- EDH-RSA-DES-CBC3-SHA DH-2048 bits 112 bits HTTP 200 OK
- DES-CBC3-SHA - 112 bits HTTP 200 OK
- SCAN COMPLETED IN 35.51 S
- -------------------------
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 210.152.243.182
- Testing SSL server 210.152.243.182 on port 443 using SNI name 210.152.243.182
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: www.e-kujira.or.jp
- Altnames: DNS:www.e-kujira.or.jp, DNS:e-kujira.or.jp
- Issuer: JPRS Domain Validation Authority - G2
- Not valid before: Aug 20 02:55:26 2018 GMT
- Not valid after: Aug 31 14:59:59 2019 GMT
- #######################################################################################################################################
- I, [2019-01-17T14:00:39.870372 #32019] INFO -- : Initiating port scan
- I, [2019-01-17T14:02:04.627148 #32019] INFO -- : Using nmap scan output file logs/nmap_output_2019-01-17_14-00-39.xml
- I, [2019-01-17T14:02:04.628443 #32019] INFO -- : Discovered open port: 210.152.243.182:80
- I, [2019-01-17T14:02:06.472965 #32019] INFO -- : Discovered open port: 210.152.243.182:443
- I, [2019-01-17T14:02:09.955434 #32019] INFO -- : <<<Enumerating vulnerable applications>>>
- [+] Yasuo found phpMyAdmin at https://210.152.243.182:443/phpmyadmin/. Requires HTTP basic auth
- I, [2019-01-17T14:04:05.237713 #32019] INFO -- : Initiating login bruteforce, hold on tight...
- [+] Trying app-specific default creds first -> admin:admin
- Could not find default credentials, sucks
- ---------------------------------------------------------------------------------------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- ---------------------------------------------------------------------------------------------------------------------------------------
- +------------+-----------------------------------------+--------------------------------------------------+-----------+-----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +------------+-----------------------------------------+--------------------------------------------------+-----------+-----------+
- | phpMyAdmin | https://210.152.243.182:443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
- +------------+-----------------------------------------+--------------------------------------------------+-----------+-----------+
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 14:07 EST
- NSE: Loaded 149 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 14:07
- Completed NSE at 14:07, 0.00s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 14:07
- Completed NSE at 14:07, 0.00s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 14:07
- Completed NSE at 14:07, 0.00s elapsed
- Initiating Ping Scan at 14:07
- Scanning 210.152.243.182 [4 ports]
- Completed Ping Scan at 14:07, 0.17s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 14:07
- Completed Parallel DNS resolution of 1 host. at 14:08, 16.50s elapsed
- Initiating Connect Scan at 14:08
- Scanning 210.152.243.182 [1000 ports]
- Discovered open port 80/tcp on 210.152.243.182
- Discovered open port 587/tcp on 210.152.243.182
- Discovered open port 21/tcp on 210.152.243.182
- Discovered open port 443/tcp on 210.152.243.182
- Discovered open port 110/tcp on 210.152.243.182
- Completed Connect Scan at 14:08, 23.31s elapsed (1000 total ports)
- Initiating Service scan at 14:08
- Scanning 5 services on 210.152.243.182
- Completed Service scan at 14:09, 35.97s elapsed (5 services on 1 host)
- Initiating OS detection (try #1) against 210.152.243.182
- Retrying OS detection (try #2) against 210.152.243.182
- Initiating Traceroute at 14:09
- Completed Traceroute at 14:09, 3.21s elapsed
- Initiating Parallel DNS resolution of 14 hosts. at 14:09
- Completed Parallel DNS resolution of 14 hosts. at 14:09, 16.51s elapsed
- NSE: Script scanning 210.152.243.182.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 14:09
- Completed NSE at 14:09, 17.38s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 14:09
- Completed NSE at 14:10, 4.95s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 14:10
- Completed NSE at 14:10, 0.00s elapsed
- Nmap scan report for 210.152.243.182
- Host is up, received reset ttl 64 (0.44s latency).
- Scanned at 2019-01-17 14:07:56 EST for 126s
- Not shown: 967 filtered ports
- Reason: 967 no-responses
- PORT STATE SERVICE REASON VERSION
- 21/tcp open ftp syn-ack vsftpd 2.2.2
- 22/tcp closed ssh conn-refused
- 25/tcp closed smtp conn-refused
- 80/tcp open http-proxy syn-ack Squid http proxy
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-open-proxy: Proxy might be redirecting requests
- |_http-title: Did not follow redirect to https://210.152.243.182/
- 110/tcp open pop3 syn-ack qmail pop3d
- 139/tcp closed netbios-ssn conn-refused
- 443/tcp open ssl/http syn-ack Apache httpd (PHP 5.1.6)
- | ssl-cert: Subject: commonName=www.e-kujira.or.jp
- | Subject Alternative Name: DNS:www.e-kujira.or.jp, DNS:e-kujira.or.jp
- | Issuer: commonName=JPRS Domain Validation Authority - G2/organizationName=Japan Registry Services Co., Ltd./countryName=JP
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-20T02:55:26
- | Not valid after: 2019-08-31T14:59:59
- | MD5: b154 8c40 9a17 05c0 21c9 1fa2 5d50 4b79
- | SHA-1: fad1 e751 921a 293a 507f a743 7cdd 12fa a572 d5af
- | -----BEGIN CERTIFICATE-----
- | MIIGDDCCBPSgAwIBAgIIX7ZDnv0PxoowDQYJKoZIhvcNAQELBQAwaTELMAkGA1UE
- | BhMCSlAxKjAoBgNVBAoTIUphcGFuIFJlZ2lzdHJ5IFNlcnZpY2VzIENvLiwgTHRk
- | LjEuMCwGA1UEAxMlSlBSUyBEb21haW4gVmFsaWRhdGlvbiBBdXRob3JpdHkgLSBH
- | MjAeFw0xODA4MjAwMjU1MjZaFw0xOTA4MzExNDU5NTlaMB0xGzAZBgNVBAMTEnd3
- | dy5lLWt1amlyYS5vci5qcDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
- | AMH/cgKrX37R0quKUDHD/ab+tJZ8wiu/wC+vRa3vHqjmFvOLp3sO3lKQSyOYykmH
- | zb5rhbZpvwHApVlUHDC3+m1okP7bMPMiMbGZCR7gE5G+xjcjUJKtP90MuulgZO/H
- | IolypRnlgFjPQ3qTDTFJx7irozIvGEaIqQ7dIobUdz3Z6odnoRhtmz63T3lNXPp1
- | tl9q318CpVvTVM+4eYYqGXhSPXkTdEhEYRSYbTh+gEHWjIxbbawUvtAkZzuJGa/r
- | RUCJMbPr4FQxhuDJ/vqWiMnD8Mx4xGqCpPZKNgR+DFeOx8sQ933FhND/ETvzjhkf
- | kx4Fl5tqyZHycZPEDaM1qR8CAwEAAaOCAwIwggL+MB8GA1UdIwQYMBaAFLs66ldi
- | eAwyrR+ye/YdBiKW4avwMD0GCCsGAQUFBwEBBDEwLzAtBggrBgEFBQcwAYYhaHR0
- | cDovL2R2LmcyLm9jc3AucHViY2VydC5qcHJzLmpwMC0GA1UdEQQmMCSCEnd3dy5l
- | LWt1amlyYS5vci5qcIIOZS1rdWppcmEub3IuanAwWQYDVR0gBFIwUDBEBgoqgwiM
- | mxtugVADMDYwNAYIKwYBBQUHAgEWKGh0dHBzOi8vanBycy5qcC9wdWJjZXJ0L2lu
- | Zm8vcmVwb3NpdG9yeS8wCAYGZ4EMAQIBMBMGA1UdJQQMMAoGCCsGAQUFBwMBMEsG
- | A1UdHwREMEIwQKA+oDyGOmh0dHA6Ly9yZXBvLnB1YmNlcnQuanBycy5qcC9zcHBj
- | YS9qcHJzL2R2Y2FfZzIvZnVsbGNybC5jcmwwHQYDVR0OBBYEFKGubFIVt0jGq7Bm
- | oeO0fKD8ggb/MA4GA1UdDwEB/wQEAwIFoDCCAX8GCisGAQQB1nkCBAIEggFvBIIB
- | awFpAHYA3esdK3oNT6Ygi4GtgWhwfi6OnQHVXIiNPRHEzbbsvswAAAFlVUtdGQAA
- | BAMARzBFAiArPuNk3I0j0pxGEz6RoLcmAMlGB9ZGVHEY6O6tMph4WwIhAPPcj+Vx
- | jackoFeapNG+yJr8Z7yt946r14Kmq8YqXFW5AHcApLkJkLQYWBSHuxOizGdwCjw1
- | mAT5G9+443fNDsgN3BAAAAFlVUtgrwAABAMASDBGAiEAx8zhlb6M4MXvo6tmc/UB
- | 8dHqEA1Rouhu8PfaM6pBiuoCIQDWvViDqWtYjIGcSV7UbIV89wL/x8rW8w6dpoOm
- | J2j+/gB2AO5Lvbd1zmC64UJpH6vhnmajD35fsHLYgwDEe4l6qP3LAAABZVVLaNUA
- | AAQDAEcwRQIhAIp3JRCKbo8GRso2y7LqIbpFjOynIj6vXHcZLRGoRiElAiBL/vC2
- | DNRnHRzMdZpBvFoGLbR0owq8IUj4XGLcXPmjNTANBgkqhkiG9w0BAQsFAAOCAQEA
- | vEcuwZySSNLWWvp0dk5ucCP+m/e/hTH5R8RR0e8QbymBKMzj5vrY10W/5Kkju4H0
- | NGuDzUTDik5RpKLXYzsr8Jg5Iq1Gecxz6xRq91VVUi1iQJ28Y9jB7+EiCuGUfKHx
- | hfD0nVH1AWIJOBOnoWysVQyIQcPyJxAOPh+bC8C98Quwq0TBMAGuvy24WGXh6XJi
- | RzReqqRvN7YPURi5kZ8c3F9VIUKOxXN/88MkXSppXGKOxYNLQlY1ItImbDzAYxVK
- | FAe5BtAqMZOLfZ9M9paMfsI9ufdm0Sy0QP2M/iCCOgrJkUdWnUBIVwzeCvntX5fv
- | g45wttnh6EfFZju+HRt8tg==
- |_-----END CERTIFICATE-----
- |_ssl-date: 2019-01-17T19:09:58+00:00; 0s from scanner time.
- 445/tcp closed microsoft-ds conn-refused
- 587/tcp open smtp syn-ack netqmail smtpd 1.04
- | smtp-commands: e-kujira.or.jp, PIPELINING, 8BITMIME,
- |_ netqmail home page: http://qmail.org/netqmail
- 1025/tcp closed NFS-or-IIS conn-refused
- 1026/tcp closed LSA-or-nterm conn-refused
- 1027/tcp closed IIS conn-refused
- 1028/tcp closed unknown conn-refused
- 1029/tcp closed ms-lsa conn-refused
- 1030/tcp closed iad1 conn-refused
- 1031/tcp closed iad2 conn-refused
- 1032/tcp closed iad3 conn-refused
- 1033/tcp closed netinfo conn-refused
- 1034/tcp closed zincite-a conn-refused
- 1035/tcp closed multidropper conn-refused
- 1036/tcp closed nsstp conn-refused
- 1037/tcp closed ams conn-refused
- 1038/tcp closed mtqp conn-refused
- 1039/tcp closed sbl conn-refused
- 1040/tcp closed netsaint conn-refused
- 1041/tcp closed danf-ak2 conn-refused
- 1042/tcp closed afrog conn-refused
- 1043/tcp closed boinc conn-refused
- 1044/tcp closed dcutility conn-refused
- 1045/tcp closed fpitp conn-refused
- 1046/tcp closed wfremotertm conn-refused
- 1047/tcp closed neod1 conn-refused
- 1048/tcp closed neod2 conn-refused
- Device type: general purpose
- Running (JUST GUESSING): Linux 3.X|2.6.X (87%)
- OS CPE: cpe:/o:linux:linux_kernel:3.2 cpe:/o:linux:linux_kernel:2.6.32
- OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
- Aggressive OS guesses: Linux 3.2 (87%), Linux 2.6.32 (86%)
- No exact OS matches for host (test conditions non-ideal).
- TCP/IP fingerprint:
- SCAN(V=7.70SVN%E=4%D=1/17%OT=21%CT=22%CU=%PV=N%DS=17%DC=T%G=N%TM=5C40D30A%P=x86_64-unknown-linux-gnu)
- SEQ(SP=103%GCD=1%ISR=106%TI=Z%TS=A)
- OPS(O1=M4B3ST11NW7%O2=M4B3ST11NW7%O3=M4B3NNT11NW7%O4=M4B3ST11NW7%O5=M4B3ST11NW7%O6=M4B3ST11)
- WIN(W1=3890%W2=3890%W3=3890%W4=3890%W5=3890%W6=3890)
- ECN(R=Y%DF=Y%TG=40%W=3908%O=M4B3NNSNW7%CC=Y%Q=)
- T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
- T2(R=N)
- T3(R=N)
- T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
- T5(R=N)
- T6(R=N)
- T7(R=N)
- U1(R=N)
- IE(R=N)
- Uptime guess: 46.698 days (since Sat Dec 1 21:24:36 2018)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=259 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Host: geirui-20161130; OS: Unix
- Host script results:
- |_clock-skew: mean: 0s, deviation: 0s, median: 0s
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 138.03 ms 10.244.200.1
- 2 138.40 ms 185.163.111.1
- 3 138.07 ms 172.30.244.193
- 4 138.07 ms 172.30.245.49
- 5 138.44 ms te5-6-600-bb1.buc1.ro.m247.ro (83.217.231.93)
- 6 174.54 ms ae-18.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.62)
- 7 176.01 ms ae-3.r25.amstnl02.nl.bb.gin.ntt.net (129.250.4.69)
- 8 267.57 ms ae-5.r23.asbnva02.us.bb.gin.ntt.net (129.250.6.162)
- 9 334.74 ms ae-10.r22.snjsca04.us.bb.gin.ntt.net (129.250.6.237)
- 10 444.99 ms ae-15.r24.osakjp02.jp.bb.gin.ntt.net (129.250.2.131)
- 11 448.03 ms ae-1.r02.osakjp02.jp.bb.gin.ntt.net (129.250.2.40)
- 12 440.23 ms ae-1.a01.osakjp02.jp.bb.gin.ntt.net (129.250.3.232)
- 13 443.99 ms xe-0-0-22-3.a01.osakjp02.jp.ce.gin.ntt.net (61.200.80.218)
- 14 ... 16
- 17 432.52 ms 210.152.243.182
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 14:10
- Completed NSE at 14:10, 0.00s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 14:10
- Completed NSE at 14:10, 0.00s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 14:10
- Completed NSE at 14:10, 0.00s elapsed
- Read data files from: /usr/local/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 126.46 seconds
- Raw packets sent: 107 (8.456KB) | Rcvd: 126 (31.020KB)
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 14:10 EST
- NSE: Loaded 149 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 14:10
- Completed NSE at 14:10, 0.00s elapsed
- Initiating NSE at 14:10
- Completed NSE at 14:10, 0.00s elapsed
- Initiating NSE at 14:10
- Completed NSE at 14:10, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 14:10
- Completed Parallel DNS resolution of 1 host. at 14:10, 16.50s elapsed
- Initiating UDP Scan at 14:10
- Scanning 210.152.243.182 [14 ports]
- Completed UDP Scan at 14:10, 2.36s elapsed (14 total ports)
- Initiating Service scan at 14:10
- Scanning 12 services on 210.152.243.182
- Service scan Timing: About 8.33% done; ETC: 14:29 (0:17:47 remaining)
- Completed Service scan at 14:12, 102.58s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against 210.152.243.182
- Retrying OS detection (try #2) against 210.152.243.182
- Initiating Traceroute at 14:12
- Completed Traceroute at 14:12, 7.21s elapsed
- Initiating Parallel DNS resolution of 1 host. at 14:12
- Completed Parallel DNS resolution of 1 host. at 14:12, 16.50s elapsed
- NSE: Script scanning 210.152.243.182.
- Initiating NSE at 14:12
- Completed NSE at 14:15, 186.71s elapsed
- Initiating NSE at 14:15
- Completed NSE at 14:15, 2.03s elapsed
- Initiating NSE at 14:15
- Completed NSE at 14:15, 0.00s elapsed
- Nmap scan report for 210.152.243.182
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 138/udp)
- HOP RTT ADDRESS
- 1 141.23 ms 10.244.200.1
- 2 ... 3
- 4 139.64 ms 10.244.200.1
- 5 137.60 ms 10.244.200.1
- 6 137.46 ms 10.244.200.1
- 7 137.45 ms 10.244.200.1
- 8 137.45 ms 10.244.200.1
- 9 137.44 ms 10.244.200.1
- 10 137.46 ms 10.244.200.1
- 11 ... 18
- 19 137.45 ms 10.244.200.1
- 20 141.09 ms 10.244.200.1
- 21 ... 28
- 29 139.73 ms 10.244.200.1
- 30 140.80 ms 10.244.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 14:15
- Completed NSE at 14:15, 0.00s elapsed
- Initiating NSE at 14:15
- Completed NSE at 14:15, 0.00s elapsed
- Initiating NSE at 14:15
- Completed NSE at 14:15, 0.00s elapsed
- Read data files from: /usr/local/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 342.35 seconds
- Raw packets sent: 141 (8.896KB) | Rcvd: 116 (21.451KB)
- #######################################################################################################################################
- Starting Nmap 7.70SVN ( https://nmap.org ) at 2019-01-17 14:15 EST
- Nmap scan report for 210.152.243.182
- Host is up (0.25s latency).
- Not shown: 19 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 80/tcp open http
- 110/tcp open pop3
- 443/tcp open https
- #######################################################################################################################################
- * default
- * default
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.10.0'
- [*] Importing host 210.152.243.182
- [*] Successfully imported /usr/share/sniper/loot/210.152.243.182/nmap/nmap-udp-210.152.243.182.xml
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.10.0'
- [*] Importing host 210.152.243.182
- [*] Successfully imported /usr/share/sniper/loot/210.152.243.182/nmap/nmap-210.152.243.182-udp.xml
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.10.0'
- [*] Importing host 210.152.243.182
- [*] Successfully imported /usr/share/sniper/loot/210.152.243.182/nmap/nmap-210.152.243.182.xml
- Hosts
- =====
- address mac name os_name os_flavor os_sp purpose info comments
- ------- --- ---- ------- --------- ----- ------- ---- --------
- 2.19.159.191 Linux 2.6.X server
- 45.60.151.214 45.60.151.214 Unknown device
- 45.60.155.214 45.60.155.214 Unknown device
- 50.23.207.250 server.subdimensionhosting.com Unknown device
- 64.111.113.208 64.111.113.208 Unknown device
- 69.163.248.88 dp-b8f0786b84.dream.press Linux 4.X server
- 74.200.39.23 agbank.com Linux 2.6.X server
- 74.200.39.24 bankofoxford.com Linux 2.6.X server
- 74.200.39.25 tcbssb.com Linux 2.6.X server
- 77.73.203.21 www.bde.es Linux 3.X server
- 85.159.192.76 www.bancaditalia.it Linux 3.X server
- 92.123.196.115 a92-123-196-115.deploy.static.akamaitechnologies.com Linux 2.6.X server
- 93.20.64.96 Linux 4.X server
- 93.20.64.97 embedded device
- 93.20.64.98 Linux 4.X server
- 93.20.64.99 Linux 4.X server
- 104.107.50.25 a104-107-50-25.deploy.static.akamaitechnologies.com Linux 2.6.X server
- 132.200.148.131 www.ffiec.gov Linux 2.6.X server
- 159.174.167.250 Linux 3.X server
- 162.144.12.212 162.144.12.212 Unknown device
- 162.211.86.202 host.inventiveground.com Linux 3.X server
- 184.154.229.101 101.229.154.184.unassigned.ord.singlehop.net Linux 2.6.X server
- 192.124.249.156 cloudproxy10156.sucuri.net Linux 3.X server
- 195.24.202.222 Linux 3.X server
- 198.71.232.3 ip-198-71-232-3.ip.secureserver.net Linux 2.6.X server
- 198.144.120.68 Unknown device
- 198.251.90.113 bitmitigate.com Linux 2.6.X server
- 199.169.201.171 Linux 3.X server
- 199.169.205.222 Linux 3.X server
- 209.59.165.178 rabbit.ceilingsky.com Linux 3.X server
- 210.152.243.182 Linux 3.X server
- Services
- ========
- host port proto name state info
- ---- ---- ----- ---- ----- ----
- 2.19.159.191 25 tcp smtp closed
- 2.19.159.191 53 udp domain unknown
- 2.19.159.191 67 udp dhcps unknown
- 2.19.159.191 68 udp dhcpc unknown
- 2.19.159.191 69 udp tftp unknown
- 2.19.159.191 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 2.19.159.191 88 udp kerberos-sec unknown
- 2.19.159.191 123 udp ntp unknown
- 2.19.159.191 137 udp netbios-ns filtered
- 2.19.159.191 138 udp netbios-dgm filtered
- 2.19.159.191 139 tcp netbios-ssn closed
- 2.19.159.191 139 udp netbios-ssn unknown
- 2.19.159.191 161 udp snmp unknown
- 2.19.159.191 162 udp snmptrap unknown
- 2.19.159.191 389 udp ldap unknown
- 2.19.159.191 443 tcp ssl/http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 2.19.159.191 445 tcp microsoft-ds closed
- 2.19.159.191 520 udp route unknown
- 2.19.159.191 2049 udp nfs unknown
- 45.60.151.214 8080 tcp http open ( 503-Service Unavailable )
- 45.60.155.214 8080 tcp http open ( 503-Service Unavailable )
- 50.23.207.250 53 udp domain unknown
- 50.23.207.250 67 udp dhcps unknown
- 50.23.207.250 68 udp dhcpc unknown
- 50.23.207.250 69 udp tftp unknown
- 50.23.207.250 88 udp kerberos-sec unknown
- 50.23.207.250 123 udp ntp unknown
- 50.23.207.250 137 udp netbios-ns filtered
- 50.23.207.250 138 udp netbios-dgm filtered
- 50.23.207.250 139 udp netbios-ssn unknown
- 50.23.207.250 161 udp snmp unknown
- 50.23.207.250 162 udp snmptrap unknown
- 50.23.207.250 389 udp ldap unknown
- 50.23.207.250 520 udp route unknown
- 50.23.207.250 2049 udp nfs unknown
- 64.111.113.208 8080 tcp http open Apache
- 69.163.248.88 22 tcp ssh closed
- 69.163.248.88 25 tcp smtp closed
- 69.163.248.88 53 udp domain unknown
- 69.163.248.88 67 udp dhcps unknown
- 69.163.248.88 68 udp dhcpc unknown
- 69.163.248.88 69 udp tftp unknown
- 69.163.248.88 80 tcp http-proxy open Squid http proxy
- 69.163.248.88 81 tcp hosts2-ns closed
- 69.163.248.88 88 udp kerberos-sec unknown
- 69.163.248.88 123 udp ntp unknown
- 69.163.248.88 137 udp netbios-ns filtered
- 69.163.248.88 138 udp netbios-dgm filtered
- 69.163.248.88 139 tcp netbios-ssn closed
- 69.163.248.88 139 udp netbios-ssn unknown
- 69.163.248.88 161 udp snmp unknown
- 69.163.248.88 162 udp snmptrap unknown
- 69.163.248.88 389 udp ldap unknown
- 69.163.248.88 443 tcp https closed
- 69.163.248.88 445 tcp microsoft-ds closed
- 69.163.248.88 520 udp route unknown
- 69.163.248.88 2049 udp nfs unknown
- 69.163.248.88 5001 tcp commplex-link closed
- 69.163.248.88 5666 tcp nrpe closed
- 69.163.248.88 60020 tcp unknown closed
- 69.163.248.88 60443 tcp unknown closed
- 74.200.39.23 25 tcp smtp closed
- 74.200.39.23 53 udp domain unknown
- 74.200.39.23 67 udp dhcps unknown
- 74.200.39.23 68 udp dhcpc unknown
- 74.200.39.23 69 udp tftp unknown
- 74.200.39.23 80 tcp http open nginx
- 74.200.39.23 88 udp kerberos-sec unknown
- 74.200.39.23 123 udp ntp unknown
- 74.200.39.23 137 udp netbios-ns filtered
- 74.200.39.23 138 udp netbios-dgm filtered
- 74.200.39.23 139 tcp netbios-ssn closed
- 74.200.39.23 139 udp netbios-ssn unknown
- 74.200.39.23 161 udp snmp unknown
- 74.200.39.23 162 udp snmptrap unknown
- 74.200.39.23 389 udp ldap unknown
- 74.200.39.23 443 tcp ssl/http open nginx
- 74.200.39.23 445 tcp microsoft-ds closed
- 74.200.39.23 520 udp route unknown
- 74.200.39.23 2049 udp nfs unknown
- 74.200.39.24 25 tcp smtp closed
- 74.200.39.24 53 udp domain unknown
- 74.200.39.24 67 udp dhcps unknown
- 74.200.39.24 68 udp dhcpc unknown
- 74.200.39.24 69 udp tftp unknown
- 74.200.39.24 80 tcp http open nginx
- 74.200.39.24 88 udp kerberos-sec unknown
- 74.200.39.24 123 udp ntp unknown
- 74.200.39.24 137 udp netbios-ns filtered
- 74.200.39.24 138 udp netbios-dgm filtered
- 74.200.39.24 139 tcp netbios-ssn closed
- 74.200.39.24 139 udp netbios-ssn unknown
- 74.200.39.24 161 udp snmp unknown
- 74.200.39.24 162 udp snmptrap unknown
- 74.200.39.24 389 udp ldap unknown
- 74.200.39.24 443 tcp ssl/http open nginx
- 74.200.39.24 445 tcp microsoft-ds closed
- 74.200.39.24 520 udp route unknown
- 74.200.39.24 2049 udp nfs unknown
- 74.200.39.25 25 tcp smtp closed
- 74.200.39.25 53 udp domain unknown
- 74.200.39.25 67 udp dhcps unknown
- 74.200.39.25 68 udp dhcpc unknown
- 74.200.39.25 69 udp tftp unknown
- 74.200.39.25 80 tcp http open nginx
- 74.200.39.25 88 udp kerberos-sec unknown
- 74.200.39.25 123 udp ntp unknown
- 74.200.39.25 137 udp netbios-ns filtered
- 74.200.39.25 138 udp netbios-dgm filtered
- 74.200.39.25 139 tcp netbios-ssn closed
- 74.200.39.25 139 udp netbios-ssn unknown
- 74.200.39.25 161 udp snmp unknown
- 74.200.39.25 162 udp snmptrap unknown
- 74.200.39.25 389 udp ldap unknown
- 74.200.39.25 443 tcp ssl/http open nginx
- 74.200.39.25 445 tcp microsoft-ds closed
- 74.200.39.25 520 udp route unknown
- 74.200.39.25 2049 udp nfs unknown
- 77.73.203.21 53 udp domain closed
- 77.73.203.21 67 udp dhcps closed
- 77.73.203.21 68 udp dhcpc closed
- 77.73.203.21 69 udp tftp closed
- 77.73.203.21 80 tcp http-proxy open Squid http proxy
- 77.73.203.21 88 udp kerberos-sec closed
- 77.73.203.21 123 udp ntp closed
- 77.73.203.21 137 udp netbios-ns filtered
- 77.73.203.21 138 udp netbios-dgm filtered
- 77.73.203.21 139 udp netbios-ssn closed
- 77.73.203.21 161 udp snmp closed
- 77.73.203.21 162 udp snmptrap closed
- 77.73.203.21 389 udp ldap closed
- 77.73.203.21 443 tcp ssl/https open
- 77.73.203.21 520 udp route closed
- 77.73.203.21 2049 udp nfs closed
- 85.159.192.76 25 tcp smtp closed
- 85.159.192.76 53 udp domain unknown
- 85.159.192.76 67 udp dhcps unknown
- 85.159.192.76 68 udp dhcpc unknown
- 85.159.192.76 69 udp tftp unknown
- 85.159.192.76 80 tcp http-proxy open Squid http proxy
- 85.159.192.76 88 udp kerberos-sec unknown
- 85.159.192.76 123 udp ntp unknown
- 85.159.192.76 137 udp netbios-ns filtered
- 85.159.192.76 138 udp netbios-dgm filtered
- 85.159.192.76 139 tcp netbios-ssn closed
- 85.159.192.76 139 udp netbios-ssn unknown
- 85.159.192.76 161 udp snmp unknown
- 85.159.192.76 162 udp snmptrap unknown
- 85.159.192.76 389 udp ldap unknown
- 85.159.192.76 445 tcp microsoft-ds closed
- 85.159.192.76 520 udp route unknown
- 85.159.192.76 2049 udp nfs unknown
- 92.123.196.115 25 tcp smtp closed
- 92.123.196.115 53 udp domain unknown
- 92.123.196.115 67 udp dhcps unknown
- 92.123.196.115 68 udp dhcpc unknown
- 92.123.196.115 69 udp tftp unknown
- 92.123.196.115 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 92.123.196.115 88 udp kerberos-sec unknown
- 92.123.196.115 123 udp ntp unknown
- 92.123.196.115 137 udp netbios-ns filtered
- 92.123.196.115 138 udp netbios-dgm filtered
- 92.123.196.115 139 tcp netbios-ssn closed
- 92.123.196.115 139 udp netbios-ssn unknown
- 92.123.196.115 161 udp snmp unknown
- 92.123.196.115 162 udp snmptrap unknown
- 92.123.196.115 389 udp ldap unknown
- 92.123.196.115 443 tcp ssl/http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 92.123.196.115 445 tcp microsoft-ds closed
- 92.123.196.115 520 udp route unknown
- 92.123.196.115 2049 udp nfs unknown
- 93.20.64.96 25 tcp smtp closed
- 93.20.64.96 53 udp domain unknown
- 93.20.64.96 67 udp dhcps unknown
- 93.20.64.96 68 udp dhcpc unknown
- 93.20.64.96 69 udp tftp unknown
- 93.20.64.96 80 tcp http-proxy open Varnish http accelerator
- 93.20.64.96 88 udp kerberos-sec unknown
- 93.20.64.96 113 tcp ident closed
- 93.20.64.96 123 udp ntp unknown
- 93.20.64.96 137 udp netbios-ns filtered
- 93.20.64.96 138 udp netbios-dgm filtered
- 93.20.64.96 139 tcp netbios-ssn closed
- 93.20.64.96 139 udp netbios-ssn unknown
- 93.20.64.96 161 udp snmp unknown
- 93.20.64.96 162 udp snmptrap unknown
- 93.20.64.96 389 udp ldap unknown
- 93.20.64.96 443 tcp ssl/http open nginx 1.10.3
- 93.20.64.96 445 tcp microsoft-ds closed
- 93.20.64.96 520 udp route unknown
- 93.20.64.96 2049 udp nfs unknown
- 93.20.64.97 25 tcp smtp closed
- 93.20.64.97 53 udp domain unknown
- 93.20.64.97 67 udp dhcps unknown
- 93.20.64.97 68 udp dhcpc unknown
- 93.20.64.97 69 udp tftp unknown
- 93.20.64.97 80 tcp http-proxy open Varnish http accelerator
- 93.20.64.97 88 udp kerberos-sec unknown
- 93.20.64.97 113 tcp ident closed
- 93.20.64.97 123 udp ntp unknown
- 93.20.64.97 137 udp netbios-ns filtered
- 93.20.64.97 138 udp netbios-dgm filtered
- 93.20.64.97 139 tcp netbios-ssn closed
- 93.20.64.97 139 udp netbios-ssn unknown
- 93.20.64.97 161 udp snmp unknown
- 93.20.64.97 162 udp snmptrap unknown
- 93.20.64.97 389 udp ldap unknown
- 93.20.64.97 443 tcp ssl/http open nginx 1.10.3
- 93.20.64.97 445 tcp microsoft-ds closed
- 93.20.64.97 520 udp route unknown
- 93.20.64.97 2049 udp nfs unknown
- 93.20.64.98 25 tcp smtp closed
- 93.20.64.98 53 udp domain unknown
- 93.20.64.98 67 udp dhcps unknown
- 93.20.64.98 68 udp dhcpc unknown
- 93.20.64.98 69 udp tftp unknown
- 93.20.64.98 80 tcp http-proxy open Varnish http accelerator
- 93.20.64.98 88 udp kerberos-sec unknown
- 93.20.64.98 113 tcp ident closed
- 93.20.64.98 123 udp ntp unknown
- 93.20.64.98 137 udp netbios-ns filtered
- 93.20.64.98 138 udp netbios-dgm filtered
- 93.20.64.98 139 tcp netbios-ssn closed
- 93.20.64.98 139 udp netbios-ssn unknown
- 93.20.64.98 161 udp snmp unknown
- 93.20.64.98 162 udp snmptrap unknown
- 93.20.64.98 389 udp ldap unknown
- 93.20.64.98 443 tcp ssl/http open nginx 1.10.3
- 93.20.64.98 445 tcp microsoft-ds closed
- 93.20.64.98 520 udp route unknown
- 93.20.64.98 2049 udp nfs unknown
- 93.20.64.99 25 tcp smtp closed
- 93.20.64.99 53 udp domain unknown
- 93.20.64.99 67 udp dhcps unknown
- 93.20.64.99 68 udp dhcpc unknown
- 93.20.64.99 69 udp tftp unknown
- 93.20.64.99 80 tcp http-proxy open Varnish http accelerator
- 93.20.64.99 88 udp kerberos-sec unknown
- 93.20.64.99 113 tcp ident closed
- 93.20.64.99 123 udp ntp unknown
- 93.20.64.99 137 udp netbios-ns filtered
- 93.20.64.99 138 udp netbios-dgm filtered
- 93.20.64.99 139 tcp netbios-ssn closed
- 93.20.64.99 139 udp netbios-ssn unknown
- 93.20.64.99 161 udp snmp unknown
- 93.20.64.99 162 udp snmptrap unknown
- 93.20.64.99 389 udp ldap unknown
- 93.20.64.99 443 tcp ssl/http open nginx 1.10.3
- 93.20.64.99 445 tcp microsoft-ds closed
- 93.20.64.99 520 udp route unknown
- 93.20.64.99 2049 udp nfs unknown
- 104.107.50.25 25 tcp smtp closed
- 104.107.50.25 53 udp domain unknown
- 104.107.50.25 67 udp dhcps unknown
- 104.107.50.25 68 udp dhcpc unknown
- 104.107.50.25 69 udp tftp unknown
- 104.107.50.25 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 104.107.50.25 88 udp kerberos-sec unknown
- 104.107.50.25 123 udp ntp unknown
- 104.107.50.25 137 udp netbios-ns filtered
- 104.107.50.25 138 udp netbios-dgm filtered
- 104.107.50.25 139 tcp netbios-ssn closed
- 104.107.50.25 139 udp netbios-ssn unknown
- 104.107.50.25 161 udp snmp unknown
- 104.107.50.25 162 udp snmptrap unknown
- 104.107.50.25 389 udp ldap unknown
- 104.107.50.25 443 tcp ssl/http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
- 104.107.50.25 445 tcp microsoft-ds closed
- 104.107.50.25 520 udp route unknown
- 104.107.50.25 2049 udp nfs unknown
- 132.200.148.131 25 tcp smtp closed
- 132.200.148.131 53 udp domain unknown
- 132.200.148.131 67 udp dhcps unknown
- 132.200.148.131 68 udp dhcpc unknown
- 132.200.148.131 69 udp tftp unknown
- 132.200.148.131 80 tcp http-proxy open F5 BIG-IP load balancer http proxy
- 132.200.148.131 88 udp kerberos-sec unknown
- 132.200.148.131 123 udp ntp unknown
- 132.200.148.131 137 udp netbios-ns filtered
- 132.200.148.131 138 udp netbios-dgm filtered
- 132.200.148.131 139 tcp netbios-ssn closed
- 132.200.148.131 139 udp netbios-ssn unknown
- 132.200.148.131 161 udp snmp unknown
- 132.200.148.131 162 udp snmptrap unknown
- 132.200.148.131 389 udp ldap unknown
- 132.200.148.131 443 tcp ssl/https open
- 132.200.148.131 445 tcp microsoft-ds closed
- 132.200.148.131 520 udp route unknown
- 132.200.148.131 2049 udp nfs unknown
- 159.174.167.250 25 tcp smtp closed
- 159.174.167.250 53 udp domain open
- 159.174.167.250 67 udp dhcps unknown
- 159.174.167.250 68 udp dhcpc unknown
- 159.174.167.250 69 udp tftp unknown
- 159.174.167.250 80 tcp http-proxy open Squid http proxy
- 159.174.167.250 88 udp kerberos-sec unknown
- 159.174.167.250 123 udp ntp unknown
- 159.174.167.250 137 udp netbios-ns filtered
- 159.174.167.250 138 udp netbios-dgm filtered
- 159.174.167.250 139 tcp netbios-ssn closed
- 159.174.167.250 139 udp netbios-ssn unknown
- 159.174.167.250 161 udp snmp unknown
- 159.174.167.250 162 udp snmptrap unknown
- 159.174.167.250 389 udp ldap unknown
- 159.174.167.250 445 tcp microsoft-ds closed
- 159.174.167.250 520 udp route unknown
- 159.174.167.250 2049 udp nfs unknown
- 162.144.12.212 8080 tcp http open nginx/1.14.1 ( 302-/404.html )
- 162.211.86.202 25 tcp smtp closed
- 162.211.86.202 53 udp domain unknown
- 162.211.86.202 67 udp dhcps unknown
- 162.211.86.202 68 udp dhcpc unknown
- 162.211.86.202 69 udp tftp unknown
- 162.211.86.202 80 tcp http open Fortinet FortiGate 50B or FortiWifi 60C or 80C firewall http config
- 162.211.86.202 88 udp kerberos-sec unknown
- 162.211.86.202 123 udp ntp unknown
- 162.211.86.202 137 udp netbios-ns filtered
- 162.211.86.202 138 udp netbios-dgm filtered
- 162.211.86.202 139 tcp netbios-ssn closed
- 162.211.86.202 139 udp netbios-ssn unknown
- 162.211.86.202 161 udp snmp unknown
- 162.211.86.202 162 udp snmptrap unknown
- 162.211.86.202 389 udp ldap unknown
- 162.211.86.202 445 tcp microsoft-ds closed
- 162.211.86.202 520 udp route unknown
- 162.211.86.202 2049 udp nfs unknown
- 184.154.229.101 25 tcp smtp closed
- 184.154.229.101 53 tcp domain open unknown banner: donuts
- 184.154.229.101 53 udp domain open unknown banner: donuts
- 184.154.229.101 67 udp dhcps unknown
- 184.154.229.101 68 udp dhcpc unknown
- 184.154.229.101 69 udp tftp unknown
- 184.154.229.101 80 tcp http-proxy open Squid http proxy
- 184.154.229.101 88 udp kerberos-sec unknown
- 184.154.229.101 111 tcp rpcbind closed
- 184.154.229.101 123 udp ntp unknown
- 184.154.229.101 137 udp netbios-ns filtered
- 184.154.229.101 138 udp netbios-dgm filtered
- 184.154.229.101 139 tcp netbios-ssn closed
- 184.154.229.101 139 udp netbios-ssn unknown
- 184.154.229.101 143 tcp imap open Dovecot imapd
- 184.154.229.101 161 udp snmp unknown
- 184.154.229.101 162 udp snmptrap unknown
- 184.154.229.101 389 udp ldap unknown
- 184.154.229.101 443 tcp ssl/http open nginx
- 184.154.229.101 445 tcp microsoft-ds closed
- 184.154.229.101 465 tcp ssl/smtp open
- 184.154.229.101 520 udp route unknown
- 184.154.229.101 587 tcp smtp open
- 184.154.229.101 993 tcp ssl/imap open Dovecot imapd
- 184.154.229.101 2049 udp nfs unknown
- 184.154.229.101 2525 tcp smtp open
- 184.154.229.101 4001 tcp newoak closed
- 184.154.229.101 5432 tcp postgresql closed
- 184.154.229.101 34571 tcp unknown closed
- 184.154.229.101 34572 tcp unknown closed
- 184.154.229.101 34573 tcp unknown closed
- 192.124.249.156 25 tcp smtp closed
- 192.124.249.156 53 udp domain unknown
- 192.124.249.156 67 udp dhcps unknown
- 192.124.249.156 68 udp dhcpc unknown
- 192.124.249.156 69 udp tftp unknown
- 192.124.249.156 80 tcp http-proxy open Squid http proxy
- 192.124.249.156 88 udp kerberos-sec unknown
- 192.124.249.156 123 udp ntp unknown
- 192.124.249.156 137 udp netbios-ns filtered
- 192.124.249.156 138 udp netbios-dgm filtered
- 192.124.249.156 139 tcp netbios-ssn closed
- 192.124.249.156 139 udp netbios-ssn unknown
- 192.124.249.156 161 udp snmp unknown
- 192.124.249.156 162 udp snmptrap unknown
- 192.124.249.156 389 udp ldap unknown
- 192.124.249.156 445 tcp microsoft-ds closed
- 192.124.249.156 520 udp route unknown
- 192.124.249.156 2049 udp nfs unknown
- 195.24.202.222 25 tcp smtp closed
- 195.24.202.222 53 udp domain unknown
- 195.24.202.222 67 udp dhcps unknown
- 195.24.202.222 68 udp dhcpc unknown
- 195.24.202.222 69 udp tftp unknown
- 195.24.202.222 80 tcp http-proxy open Squid http proxy
- 195.24.202.222 88 udp kerberos-sec unknown
- 195.24.202.222 123 udp ntp unknown
- 195.24.202.222 137 udp netbios-ns filtered
- 195.24.202.222 138 udp netbios-dgm filtered
- 195.24.202.222 139 tcp netbios-ssn closed
- 195.24.202.222 139 udp netbios-ssn unknown
- 195.24.202.222 161 udp snmp unknown
- 195.24.202.222 162 udp snmptrap unknown
- 195.24.202.222 389 udp ldap unknown
- 195.24.202.222 443 tcp ssl/http open Apache httpd
- 195.24.202.222 445 tcp microsoft-ds closed
- 195.24.202.222 520 udp route unknown
- 195.24.202.222 2049 udp nfs unknown
- 198.71.232.3 25 tcp smtp closed
- 198.71.232.3 53 udp domain unknown
- 198.71.232.3 67 udp dhcps unknown
- 198.71.232.3 68 udp dhcpc unknown
- 198.71.232.3 69 udp tftp unknown
- 198.71.232.3 80 tcp http open Samsung AllShare httpd
- 198.71.232.3 88 udp kerberos-sec unknown
- 198.71.232.3 123 udp ntp unknown
- 198.71.232.3 137 udp netbios-ns filtered
- 198.71.232.3 138 udp netbios-dgm filtered
- 198.71.232.3 139 tcp netbios-ssn closed
- 198.71.232.3 139 udp netbios-ssn unknown
- 198.71.232.3 161 udp snmp unknown
- 198.71.232.3 162 udp snmptrap unknown
- 198.71.232.3 389 udp ldap unknown
- 198.71.232.3 443 tcp ssl/http open Samsung AllShare httpd
- 198.71.232.3 445 tcp microsoft-ds closed
- 198.71.232.3 520 udp route unknown
- 198.71.232.3 2049 udp nfs unknown
- 198.144.120.68 53 udp domain unknown
- 198.144.120.68 67 udp dhcps unknown
- 198.144.120.68 68 udp dhcpc unknown
- 198.144.120.68 69 udp tftp unknown
- 198.144.120.68 88 udp kerberos-sec unknown
- 198.144.120.68 123 udp ntp unknown
- 198.144.120.68 137 udp netbios-ns filtered
- 198.144.120.68 138 udp netbios-dgm filtered
- 198.144.120.68 139 udp netbios-ssn unknown
- 198.144.120.68 161 udp snmp unknown
- 198.144.120.68 162 udp snmptrap unknown
- 198.144.120.68 389 udp ldap unknown
- 198.144.120.68 520 udp route unknown
- 198.144.120.68 2049 udp nfs unknown
- 198.251.90.113 22 tcp tcpwrapped open OpenSSH 6.7p1 Debian 5+deb8u7 protocol 2.0
- 198.251.90.113 53 udp domain closed
- 198.251.90.113 67 udp dhcps closed
- 198.251.90.113 68 udp dhcpc unknown
- 198.251.90.113 69 udp tftp closed
- 198.251.90.113 80 tcp http open nginx 1.14.2
- 198.251.90.113 88 udp kerberos-sec closed
- 198.251.90.113 123 udp ntp closed
- 198.251.90.113 137 udp netbios-ns filtered
- 198.251.90.113 138 udp netbios-dgm filtered
- 198.251.90.113 139 udp netbios-ssn closed
- 198.251.90.113 161 udp snmp closed
- 198.251.90.113 162 udp snmptrap closed
- 198.251.90.113 389 udp ldap closed
- 198.251.90.113 443 tcp ssl/http open nginx 1.14.2
- 198.251.90.113 520 udp route closed
- 198.251.90.113 1272 tcp cspmlockmgr filtered
- 198.251.90.113 2049 udp nfs closed
- 198.251.90.113 4998 tcp maybe-veritas filtered
- 198.251.90.113 8082 tcp blackice-alerts filtered
- 198.251.90.113 16992 tcp amt-soap-http filtered
- 199.169.201.171 25 tcp smtp closed
- 199.169.201.171 42 tcp tcpwrapped open
- 199.169.201.171 53 udp domain unknown
- 199.169.201.171 67 udp dhcps unknown
- 199.169.201.171 68 udp dhcpc unknown
- 199.169.201.171 69 udp tftp unknown
- 199.169.201.171 80 tcp http-proxy open Squid http proxy
- 199.169.201.171 81 tcp tcpwrapped open
- 199.169.201.171 88 udp kerberos-sec unknown
- 199.169.201.171 123 udp ntp filtered
- 199.169.201.171 137 udp netbios-ns filtered
- 199.169.201.171 138 udp netbios-dgm filtered
- 199.169.201.171 139 tcp netbios-ssn closed
- 199.169.201.171 139 udp netbios-ssn unknown
- 199.169.201.171 161 udp snmp unknown
- 199.169.201.171 162 udp snmptrap unknown
- 199.169.201.171 389 udp ldap unknown
- 199.169.201.171 416 tcp tcpwrapped open
- 199.169.201.171 443 tcp ssl/http open Microsoft IIS httpd 7.5
- 199.169.201.171 445 tcp microsoft-ds closed
- 199.169.201.171 520 udp route unknown
- 199.169.201.171 625 tcp tcpwrapped open
- 199.169.201.171 691 tcp tcpwrapped open
- 199.169.201.171 1044 tcp tcpwrapped open
- 199.169.201.171 1045 tcp tcpwrapped open
- 199.169.201.171 1067 tcp tcpwrapped open
- 199.169.201.171 1583 tcp tcpwrapped open
- 199.169.201.171 2049 udp nfs unknown
- 199.169.201.171 3269 tcp tcpwrapped open
- 199.169.201.171 3826 tcp tcpwrapped open
- 199.169.201.171 5221 tcp tcpwrapped open
- 199.169.201.171 6689 tcp tcpwrapped open
- 199.169.201.171 7937 tcp tcpwrapped open
- 199.169.201.171 8022 tcp tcpwrapped open
- 199.169.201.171 8290 tcp tcpwrapped open
- 199.169.201.171 8649 tcp tcpwrapped open
- 199.169.201.171 9110 tcp tcpwrapped open
- 199.169.201.171 9593 tcp tcpwrapped open
- 199.169.201.171 10025 tcp tcpwrapped open
- 199.169.201.171 16016 tcp tcpwrapped open
- 199.169.201.171 16080 tcp tcpwrapped open
- 199.169.201.171 34572 tcp tcpwrapped open
- 199.169.201.171 44442 tcp tcpwrapped open
- 199.169.205.222 25 tcp smtp closed
- 199.169.205.222 53 udp domain unknown
- 199.169.205.222 67 udp dhcps unknown
- 199.169.205.222 68 udp dhcpc unknown
- 199.169.205.222 69 udp tftp unknown
- 199.169.205.222 80 tcp nagios-nsca open Nagios NSCA
- 199.169.205.222 88 udp kerberos-sec unknown
- 199.169.205.222 123 udp ntp unknown
- 199.169.205.222 137 udp netbios-ns unknown
- 199.169.205.222 138 udp netbios-dgm unknown
- 199.169.205.222 139 tcp netbios-ssn closed
- 199.169.205.222 139 udp netbios-ssn unknown
- 199.169.205.222 161 udp snmp unknown
- 199.169.205.222 162 udp snmptrap unknown
- 199.169.205.222 389 udp ldap unknown
- 199.169.205.222 443 tcp ssl/https open
- 199.169.205.222 445 tcp microsoft-ds closed
- 199.169.205.222 520 udp route unknown
- 199.169.205.222 2049 udp nfs unknown
- 209.59.165.178 25 tcp smtp closed
- 209.59.165.178 53 udp domain unknown
- 209.59.165.178 67 udp dhcps unknown
- 209.59.165.178 68 udp dhcpc unknown
- 209.59.165.178 69 udp tftp unknown
- 209.59.165.178 80 tcp http-proxy open Squid http proxy
- 209.59.165.178 88 udp kerberos-sec unknown
- 209.59.165.178 123 udp ntp unknown
- 209.59.165.178 137 udp netbios-ns filtered
- 209.59.165.178 138 udp netbios-dgm filtered
- 209.59.165.178 139 tcp netbios-ssn closed
- 209.59.165.178 139 udp netbios-ssn unknown
- 209.59.165.178 161 udp snmp unknown
- 209.59.165.178 162 udp snmptrap unknown
- 209.59.165.178 389 udp ldap unknown
- 209.59.165.178 445 tcp microsoft-ds closed
- 209.59.165.178 520 udp route unknown
- 209.59.165.178 2049 udp nfs unknown
- 210.152.243.182 21 tcp ftp open vsftpd 2.2.2
- 210.152.243.182 22 tcp ssh closed
- 210.152.243.182 25 tcp smtp closed
- 210.152.243.182 53 udp domain unknown
- 210.152.243.182 67 udp dhcps unknown
- 210.152.243.182 68 udp dhcpc unknown
- 210.152.243.182 69 udp tftp unknown
- 210.152.243.182 80 tcp http-proxy open Squid http proxy
- 210.152.243.182 88 udp kerberos-sec unknown
- 210.152.243.182 110 tcp pop3 open qmail pop3d
- 210.152.243.182 123 udp ntp unknown
- 210.152.243.182 137 udp netbios-ns filtered
- 210.152.243.182 138 udp netbios-dgm filtered
- 210.152.243.182 139 tcp netbios-ssn closed
- 210.152.243.182 139 udp netbios-ssn unknown
- 210.152.243.182 161 udp snmp unknown
- 210.152.243.182 162 udp snmptrap unknown
- 210.152.243.182 389 udp ldap unknown
- 210.152.243.182 443 tcp ssl/http open Apache httpd PHP 5.1.6
- 210.152.243.182 445 tcp microsoft-ds closed
- 210.152.243.182 520 udp route unknown
- 210.152.243.182 587 tcp smtp open netqmail smtpd 1.04
- 210.152.243.182 1025 tcp nfs-or-iis closed
- 210.152.243.182 1026 tcp lsa-or-nterm closed
- 210.152.243.182 1027 tcp iis closed
- 210.152.243.182 1028 tcp unknown closed
- 210.152.243.182 1029 tcp ms-lsa closed
- 210.152.243.182 1030 tcp iad1 closed
- 210.152.243.182 1031 tcp iad2 closed
- 210.152.243.182 1032 tcp iad3 closed
- 210.152.243.182 1033 tcp netinfo closed
- 210.152.243.182 1034 tcp zincite-a closed
- 210.152.243.182 1035 tcp multidropper closed
- 210.152.243.182 1036 tcp nsstp closed
- 210.152.243.182 1037 tcp ams closed
- 210.152.243.182 1038 tcp mtqp closed
- 210.152.243.182 1039 tcp sbl closed
- 210.152.243.182 1040 tcp netsaint closed
- 210.152.243.182 1041 tcp danf-ak2 closed
- 210.152.243.182 1042 tcp afrog closed
- 210.152.243.182 1043 tcp boinc closed
- 210.152.243.182 1044 tcp dcutility closed
- 210.152.243.182 1045 tcp fpitp closed
- 210.152.243.182 1046 tcp wfremotertm closed
- 210.152.243.182 1047 tcp neod1 closed
- 210.152.243.182 1048 tcp neod2 closed
- 210.152.243.182 2049 udp nfs unknown
- #######################################################################################################################################
- Anonymous JTSEC #OpWhales Full Recon #1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement